DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
02778055e0ebd2142e75e30b1d223430.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02778055e0ebd2142e75e30b1d223430.dll
Resource
win10v2004-20231215-en
Target
02778055e0ebd2142e75e30b1d223430
Size
81KB
MD5
02778055e0ebd2142e75e30b1d223430
SHA1
b3b9a05ec13e8315d3030e4da314dbfc7c31b6c9
SHA256
2a263f2e0912e7bd7e27ac291ffa6e2b73902c1bfe2c64bf92b01801d5dbd2f2
SHA512
0fc5a40b48aba948ac5884158a14627ea538778af0d430af912256c161060a6ffda9ca6e2d1e060d05cc82e3374589e8bcf8d18a7adbc0b07ad5df384f15613a
SSDEEP
1536:+p1qnTQf6yPPzjoWQtO6w65mQoLaCv5KGjkcOkC8eggGAvN+HPYVq:+wTxynPQtV5P2aCv5KGjkj8ePvN+HPY0
Checks for missing Authenticode signature.
resource |
---|
02778055e0ebd2142e75e30b1d223430 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ