DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
07a18f98d05e7b907173fb71f49600a9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07a18f98d05e7b907173fb71f49600a9.dll
Resource
win10v2004-20231215-en
Target
07a18f98d05e7b907173fb71f49600a9
Size
156KB
MD5
07a18f98d05e7b907173fb71f49600a9
SHA1
45f7aec703614867e1206d044ff60f9fc35f1be1
SHA256
686376c0eba8ecd6f04c1c6084c494ac15ba3e0b38641012265c7b51093ad711
SHA512
1f45dc2b9502fa23a6c41686ac02c17fc1416bee2ea9f3086f7f8e146eccb553adacda475907cbaf54b86a875f2804118ca0f393d8f46e950c47398542d8c06c
SSDEEP
3072:E0LXUKO3UdInk1CaCxua+H9E9RmLJQKSIn:rDUuSnk/LHqfmm
Checks for missing Authenticode signature.
resource |
---|
07a18f98d05e7b907173fb71f49600a9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE