DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HookOf
HookOn
Static task
static1
Behavioral task
behavioral1
Sample
485aaa6f101d35e9d113b359784f6ff9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
485aaa6f101d35e9d113b359784f6ff9.dll
Resource
win10v2004-20231215-en
Target
485aaa6f101d35e9d113b359784f6ff9
Size
25KB
MD5
485aaa6f101d35e9d113b359784f6ff9
SHA1
d5683f469274fea021a113dcab0ee8a9bd3411c4
SHA256
05868bd008e98a890d1e471b1837cc9432444d6990b5d58f2f30231dba2a7144
SHA512
6d72815b2e03f0c69d32624c09407e3fb578005f4aeb8d9d071f8f4455fea1e16f9f94d72a280873f6bfe9dd135fd6bd136c2e0f4b88afd1bd7a08cc2b8b6300
SSDEEP
768:45CKBqdSHQWYXPSz0eBnUJUAf1mrqxEwd5:4gqqYHQba9UJUAf7EU5
Checks for missing Authenticode signature.
resource |
---|
485aaa6f101d35e9d113b359784f6ff9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
HookOf
HookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ