DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
068b5a2b05b82744b8248155211c0f19.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
068b5a2b05b82744b8248155211c0f19.dll
Resource
win10v2004-20231215-en
Target
068b5a2b05b82744b8248155211c0f19
Size
167KB
MD5
068b5a2b05b82744b8248155211c0f19
SHA1
95406d6494cd7cf5257d6ea69adfc85bfe98d9e5
SHA256
981750982ee29f77bfce8bd25c1b4e6b9ba9d9a0ee56685354c914b676f96f5b
SHA512
003b1d0e6fa9d41783ff841d580b6ce31caf1a5f282fed595f63dce3bff46e38be2fc6b9ea2713548410b492f672a50360371e57222e34be60b297133addb0b0
SSDEEP
3072:HC3phzkajpqtyDmosX68WkGoaKzgHHU63hHXy:i3pd1pmrtGFKc5X
Checks for missing Authenticode signature.
resource |
---|
068b5a2b05b82744b8248155211c0f19 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE