DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1fa04ec06e6af003519d386b146a65c0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fa04ec06e6af003519d386b146a65c0.dll
Resource
win10v2004-20231222-en
Target
1fa04ec06e6af003519d386b146a65c0
Size
36KB
MD5
1fa04ec06e6af003519d386b146a65c0
SHA1
0503bf24ef4a74674bc2882b81d460853838ff39
SHA256
6a50632938ee1ab3c7927bcaff0c6984f278c47d1c8d6e5231854c96fd57b6a1
SHA512
09e11868895b5fcac8f158341202e40f09bb92d925813be2d148c063e067e224dc52ce1e0b41928997731e9c4393d68bf321a0373a48077ec93a1a04d0eef4fa
SSDEEP
768:/Qoi6qZO1Qegd2NIFPfBRquuBrdHmaJ3Oq:/Qv6qZ4Q3JRJgPOq
Checks for missing Authenticode signature.
resource |
---|
1fa04ec06e6af003519d386b146a65c0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ