DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1149aafc6f02b630312d110ee434e4fe.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1149aafc6f02b630312d110ee434e4fe.dll
Resource
win10v2004-20231215-en
Target
1149aafc6f02b630312d110ee434e4fe
Size
33KB
MD5
1149aafc6f02b630312d110ee434e4fe
SHA1
0b9edbe1fe268ebc161d6890dcfa9da829a01faf
SHA256
2c8f991b85fe1699a7301a9313efd17deb72d7ba3acccd7bd39e816d548706b7
SHA512
15ad15d7883af4586e30734674562b8ddd46b70808e08172849ca26b33cd46031c4722dea5b970a8a514b029f9155f3126951ff96a69287755d3f0133b5d6b0b
SSDEEP
768:ZePqx1szKSxIlMpzRA0/MyjoYbBvRon79:cPqx1s0fLydqn79
Checks for missing Authenticode signature.
resource |
---|
1149aafc6f02b630312d110ee434e4fe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ