DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsHookOp
MsHookif
Static task
static1
Behavioral task
behavioral1
Sample
0ca34a4160d7ef9994aec3513c993f89.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ca34a4160d7ef9994aec3513c993f89.dll
Resource
win10v2004-20231215-en
Target
0ca34a4160d7ef9994aec3513c993f89
Size
45KB
MD5
0ca34a4160d7ef9994aec3513c993f89
SHA1
b402970beaa67ced0060e9cebb952f656e468251
SHA256
6128ea2a0790b442ef8598907f3dfc983f9668640aed7e16cf5cec35a8c70e6e
SHA512
7ae7350f06b51ee7dfcd525ff57b1907073b22bb374298bbc2a77f0af5b31bd447ffa66777cde22756904247a12506932d4c056019758aab8b1325fdd08c4825
SSDEEP
768:U881R1oxNRHZ0hLGzf3Jh8iHCjMA2K69EAxkOZaTIuesux4qdNO6:UzO50hLGzfYiHCj/2VEPWaEuZGpNj
Checks for missing Authenticode signature.
resource |
---|
0ca34a4160d7ef9994aec3513c993f89 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsHookOp
MsHookif
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ