DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
311b48a6862f1a6dd66e8417d2e4b2dd.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
311b48a6862f1a6dd66e8417d2e4b2dd.dll
Resource
win10v2004-20231222-en
Target
311b48a6862f1a6dd66e8417d2e4b2dd
Size
99KB
MD5
311b48a6862f1a6dd66e8417d2e4b2dd
SHA1
e542481b613e6919373d1e790dd650cb0168cc8c
SHA256
bdcd4119f60df25acf8123e4522b8e08becd95a900355c6c355bbd8552567ce2
SHA512
c09008893c8cd8e8072dd32ef026f2731607f06868333ef18cfe0a6ed056814bfb0ed945881ebc991a83fa7e84ae82956d6bc914146dd441b072444ad9cd8a43
SSDEEP
3072:2AuyXCeJfW3O2U3RCRs97+abkMvXYLVvafKtos/U0m9:2TyCezRCkQof+l
Checks for missing Authenticode signature.
resource |
---|
311b48a6862f1a6dd66e8417d2e4b2dd |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ