DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MgHookOk
MgHookOn
Static task
static1
Behavioral task
behavioral1
Sample
c3836a3de40ebc90c250e707787782ce.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3836a3de40ebc90c250e707787782ce.dll
Resource
win10v2004-20240226-en
Target
c3836a3de40ebc90c250e707787782ce
Size
29KB
MD5
c3836a3de40ebc90c250e707787782ce
SHA1
a28e6c1f61ed3c91a5cf4a6af5e084654b285783
SHA256
764db38cc2457bef3980f34214ba74bd01a753f14d9fd395173aa246e2a4af9e
SHA512
c52c1722a355886b6bc300e6dd7d61be1bb9fa4a8ccb1c33d1db5181a949c5350adb90253b63ca9c12ec9a9f9b0c50056358a77c6543ae052b9c0716b79d3780
SSDEEP
768:GKSCquFw0GQO/mRsrr3nkXyRqtNqBwIqbsoMdDyjgR:yCquFw0GQiP0/O9sS
Checks for missing Authenticode signature.
resource |
---|
c3836a3de40ebc90c250e707787782ce |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MgHookOk
MgHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ