DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1c9d120d56e83cc66777ba841fe45f36.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c9d120d56e83cc66777ba841fe45f36.dll
Resource
win10v2004-20231215-en
Target
1c9d120d56e83cc66777ba841fe45f36
Size
34KB
MD5
1c9d120d56e83cc66777ba841fe45f36
SHA1
a0fd2d1616a289899163bf332794247e9c1efb6f
SHA256
14e077e9b893a67bad59c37289c7dcd8600ebf343e2ea822dcb4491d1080f4b3
SHA512
ecfa01d4d089f52e57753dbec8815e0c6e2da5f0d623b54f3ce46224f813695988e31c91a52c33ab0b7477d18067060701631c00b2a372cffd7c5f8bced58786
SSDEEP
768:jQoi6qZO1Qegd2haWNBZUT8BGsJdsGJJ3q/o:jQv6qZ4Q39WXZUUGmfqg
Checks for missing Authenticode signature.
resource |
---|
1c9d120d56e83cc66777ba841fe45f36 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ