DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
092bde116b726dda92831856d5de460d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
092bde116b726dda92831856d5de460d.dll
Resource
win10v2004-20231215-en
Target
092bde116b726dda92831856d5de460d
Size
36KB
MD5
092bde116b726dda92831856d5de460d
SHA1
546e1090db3faab161215341025b17cab7d1a13a
SHA256
3829065a97bc965d01025f98c468e135b31b16b491955185b221ca4a4f65e823
SHA512
04c1f0096b6b2807a57d08896cbc04913f76fb149358db7a21ab380c28f727acf55daa78e9cc98819ec8211d5dd00f44147b1fbc79aebc864ef1e227fbcf944e
SSDEEP
768:ZQoi6qZOMQOppidaRg+aNIVcJ88u6UKdQwi28:ZQv6qZpQc3FV0G92
Checks for missing Authenticode signature.
resource |
---|
092bde116b726dda92831856d5de460d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ