DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1b6ab38fda885c3c872e070a86c3e265.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b6ab38fda885c3c872e070a86c3e265.dll
Resource
win10v2004-20231215-en
Target
1b6ab38fda885c3c872e070a86c3e265
Size
99KB
MD5
1b6ab38fda885c3c872e070a86c3e265
SHA1
e677123be6891d3f9f9b34148f0c115a56c4ac21
SHA256
a4635605d4c603c722827e3a8c5ea551fd9700e5d7f6cb6f4569c70599a20c5d
SHA512
e45588d1555e63ea93606a0811a45d43d415f51b5e55f2bfe3cf11a53bf85b6edd6866a161412355b1159fa93ac02361930051e69e74551f02362fcd6f6b2aa5
SSDEEP
3072:PGr5lj7b9NDFeQj3bTlwRQUadSyDwmwhtD:PU5J7bzbZSQU0eh
Checks for missing Authenticode signature.
resource |
---|
1b6ab38fda885c3c872e070a86c3e265 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE