DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0e9fa391b449719565a188b51105913a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e9fa391b449719565a188b51105913a.dll
Resource
win10v2004-20231215-en
Target
0e9fa391b449719565a188b51105913a
Size
169KB
MD5
0e9fa391b449719565a188b51105913a
SHA1
845b9d1b5d2fcbf23333aa577cb18ccbaed3821b
SHA256
e9063e847f506e45000ee8f983b3db62bc19f2e7fa79edc18f7b8162b6dfe46c
SHA512
01a4f7b305e2fdae2b18dac6f6d29b74299dc5e341e386b912df5f7dc5deb0de1c97e821abf9a9a7b80ef74d296c95b7775e5df26319f1639ccf5390bada72e9
SSDEEP
3072:h58nVS9CNRMrdfbkqaX9y8lJupNO2hOtvncB4SMM99QmVK9yB4U:hmVMCTMrdbWQ8lJ4NO2hOtvLTm0yB
Checks for missing Authenticode signature.
Processes:
resource |
---|
0e9fa391b449719565a188b51105913a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
QueryDosDeviceA
SetWaitableTimer
SearchPathW
CloseHandle
Process32FirstW
SetConsoleScreenBufferSize
SetEvent
PeekConsoleInputA
RtlZeroMemory
QueueUserAPC
FormatMessageA
RtlInitializeGenericTable
RtlAnsiStringToUnicodeString
DestroyCursor
LoadMenuIndirectA
DestroyAcceleratorTable
LoadAcceleratorsW
LoadMenuA
LoadCursorW
LoadAcceleratorsA
LoadMenuW
ChangeServiceConfigA
ResizePalette
SetLayout
PtVisible
GetRandomRgn
GetSystemPaletteUse
SetPixelV
_atodbl
_sys_errlist
free
ldexp
SHDoDragDrop
RasGetProjectionInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ