DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MgHookOk
MgHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ccdc4a3f1dae463d81199cf885145a70N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ccdc4a3f1dae463d81199cf885145a70N.dll
Resource
win10v2004-20240802-en
Target
ccdc4a3f1dae463d81199cf885145a70N.exe
Size
30KB
MD5
ccdc4a3f1dae463d81199cf885145a70
SHA1
af395eac2f0fb3768f8e984018c05fe155f49e2c
SHA256
cd36f61b06746e400d3b6e279292b4df81e8d446901173fcbdb3b3eb1f8884a5
SHA512
5fed15aab09aa57ee8d47687091ffeeb78b649712735b5e32d260ec7e0b70135ec7e82c11e2ba594e99bef7ba0bba4ee64191e8f7774c6eb889a75317ba82f03
SSDEEP
768:KKSCquFw0GQO/mRsrlier9dlKtNrdDyk/:+CquFw0GQicEUnhr/
Checks for missing Authenticode signature.
resource |
---|
ccdc4a3f1dae463d81199cf885145a70N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MgHookOk
MgHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ