DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
52de6fedbe1925df2b75c296c3bf4035.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52de6fedbe1925df2b75c296c3bf4035.dll
Resource
win10v2004-20231215-en
Target
52de6fedbe1925df2b75c296c3bf4035
Size
29KB
MD5
52de6fedbe1925df2b75c296c3bf4035
SHA1
3dcfae91e49b58ffc76cf7ac48d1997ca4680ad7
SHA256
71f85fabdc5e3b89a3f5fb2410f46de11be69c7a2f05cc63b361ed02aa1b278f
SHA512
5d45fa03c28cf931989203da3766de74b3cf415d6a83391c99745cab5ff5ae0fb9ff6f4fbbd27dec467408ae2c41a5493bb5986ed1b5d7a9955eb4c7e0c148bb
SSDEEP
768:DKSyqu+I0GQHIRLffXua8VY7CGZTfRNgHmG:hyqu+I0GQcnXn8C7CGnNM
Checks for missing Authenticode signature.
resource |
---|
52de6fedbe1925df2b75c296c3bf4035 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ