DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1b99239f50e86000f7389cb89a1cfeb9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b99239f50e86000f7389cb89a1cfeb9.dll
Resource
win10v2004-20231215-en
Target
1b99239f50e86000f7389cb89a1cfeb9
Size
70KB
MD5
1b99239f50e86000f7389cb89a1cfeb9
SHA1
295a8f39244d8eb03655aedcc28b91c913dd78bf
SHA256
3603c8f3ed9f5387c5286489a89fba10ec280257867169235d797e6f476298e3
SHA512
8b898864fa6972f5b7f97221912255d798335ebbbb5b4d9ea0a971292ab4e42878b7136fd94f442e7890820b75235b548b4bc41daca2f6ed5f668b962cd2e9af
SSDEEP
1536:Bkan0gImyslun+uvsPPhXj8WavUGz5uZAanZNnVnniX:Wa0gIk9npjvs5luZjZG
Checks for missing Authenticode signature.
resource |
---|
1b99239f50e86000f7389cb89a1cfeb9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE