DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1b60792ffca3320d84930975beff2bb0.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b60792ffca3320d84930975beff2bb0.dll
Resource
win10v2004-20231215-en
Target
1b60792ffca3320d84930975beff2bb0
Size
167KB
MD5
1b60792ffca3320d84930975beff2bb0
SHA1
538fa66a5af66b8bd58904765ffd2927fe2e6b3e
SHA256
5e4bba15a1b7bfa848b5e894ce5d9f341abde1113dd1379aa61f7d423600b4be
SHA512
bab7572e3bc1bd530671f54c6b07139193ee4d04e03dc6c8b7e7f9f533484dc778465dd243daf73f932a8c91497088c4346a31845247a0bb079f9b21c0242fe2
SSDEEP
1536:ol9KfwHsHGW6ccOltovP9/rLaehICv/umgkfldvjYDNn4yH7b:ol9KfYsHz3cUEl/vXumHDvjYDl4yH7
Checks for missing Authenticode signature.
resource |
---|
1b60792ffca3320d84930975beff2bb0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE