DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1609ca288c8a9aeb2e1e83c14109e6de.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1609ca288c8a9aeb2e1e83c14109e6de.dll
Resource
win10v2004-20231215-en
Target
1609ca288c8a9aeb2e1e83c14109e6de
Size
34KB
MD5
1609ca288c8a9aeb2e1e83c14109e6de
SHA1
313678d118da91dbf1a2e3e61ff51708ec27a478
SHA256
a7fe9ff567913b34f69075a6d8141a4f90c16b4980187cc592d00e599dbbffdb
SHA512
2b42ddfc161b18994ef8c292ba2eb60d583c7059585e85d76a84632e06156c24cd2b54ce3ce764ff62dc21e13fe9aa90b8110e931b24c32528a394fb3bbdd348
SSDEEP
768:XroiKqZO1QkDaxM9c4frlVVamlNjXgHTpQmFU:XrvKqZoQFxALDVamlcZFU
Checks for missing Authenticode signature.
resource |
---|
1609ca288c8a9aeb2e1e83c14109e6de |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ