DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
51de1d094d1081a8c70d88911e4b5615.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
51de1d094d1081a8c70d88911e4b5615.dll
Resource
win10v2004-20231215-en
Target
51de1d094d1081a8c70d88911e4b5615
Size
35KB
MD5
51de1d094d1081a8c70d88911e4b5615
SHA1
2ad8be6af91eedf78d8d790eedf0eabfbcc6f032
SHA256
16ed97bc33805fe19aeb6455d30f98e8536e330ef84f80758db17084324749ee
SHA512
465e5488c88667675980c76b9f6c71e80f4b2af2faaef6b7ff870ac92564b33a3b9532ff6f433551b0611193b00088731cfea9a31912d9750a9ecb50ceda5ea9
SSDEEP
768:GQoi6qZO1Qegd2CUrMosoSDeuqQfdHFWJ36MIu:GQv6qZ4Q3BzosoSVL1k6lu
Checks for missing Authenticode signature.
resource |
---|
51de1d094d1081a8c70d88911e4b5615 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ