DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
51911ae1814be3d395e4c495b2b6da13.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51911ae1814be3d395e4c495b2b6da13.dll
Resource
win10v2004-20231215-en
Target
51911ae1814be3d395e4c495b2b6da13
Size
242KB
MD5
51911ae1814be3d395e4c495b2b6da13
SHA1
23f3a5c4aa5ac6265b6d35466e600157264399a3
SHA256
c15859380816a3153f13acb5f162955c4089797cf2dab9116c2f9d1651db9e5f
SHA512
75e5ace2526688d90bf358e1d8193683e9d032dafe013cb9b36166bd5f91369e3662debf09d511acb250ba12e94da9b4cfe14ea1fe8229c337d85deb1b4021f2
SSDEEP
1536:nHFMqaF9Q+n0H6ixeiHCj/ADfV4mwte7yd+YsG0B/VmM72cUr3333aYeO06RG3yW:nlmr0H6ixeGp4mV7An0B/Vm0XYnbcDNV
Checks for missing Authenticode signature.
resource |
---|
51911ae1814be3d395e4c495b2b6da13 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ