DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1a1f63fbe144ef522177291931cdd966.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a1f63fbe144ef522177291931cdd966.dll
Resource
win10v2004-20231215-en
Target
1a1f63fbe144ef522177291931cdd966
Size
90KB
MD5
1a1f63fbe144ef522177291931cdd966
SHA1
867911475175d6555c6788c8dd2e76e7d9847162
SHA256
6816628cef1559025135f99ff37f577695570b0547ac543d5a6471555740ea5c
SHA512
96df275dec0862ece51496cc656f06d7cdbda506f9d1e6180cea4d705a008e5e08494a015e51131495e5c9c645e2a45e6640bf34198042b5e0c7fd4973876483
SSDEEP
1536:7p9SEVXJ8XEhi08fqYHO8l642JmOdluSYfYyMYlurI4BeIqgFsVe4ao3lB:7p97J80JUqclXsBdlZYVM9Ipi2/5
Checks for missing Authenticode signature.
resource |
---|
1a1f63fbe144ef522177291931cdd966 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE