DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
0352660634e6277a6778335282253774.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0352660634e6277a6778335282253774.dll
Resource
win10v2004-20231215-en
Target
0352660634e6277a6778335282253774
Size
91KB
MD5
0352660634e6277a6778335282253774
SHA1
f683bc58066bdced4a7302873464efe510dc5ffb
SHA256
e21cb12eaecff5a4d232ae424120ce20aa152068e793cfc3842114b4074f35c5
SHA512
02bf53dd459315e6df040606401f919f44973d8a60b6109f219f2f2b91921cc43b2a4cfd3cc599ca6d530f2b8093358d21e70d25e1f2cbf995cfe598c35c1373
SSDEEP
1536:ILuk51zz8sxohT8AjdkV1iywNPVNzv1iwhKakiPnZpOakszVw6HO8AnK6yoadk5:Aus1QQum8vgwhKyGafRu8AnK6Qm5
Checks for missing Authenticode signature.
resource |
---|
0352660634e6277a6778335282253774 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE