DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
57e806463cc9ef89375635c15f0f5d1b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57e806463cc9ef89375635c15f0f5d1b.dll
Resource
win10v2004-20231222-en
Target
57e806463cc9ef89375635c15f0f5d1b
Size
158KB
MD5
57e806463cc9ef89375635c15f0f5d1b
SHA1
6c1135f42de90bb5b3e4aea5a92c7627754a134d
SHA256
1cc3211047956794f2ff0e944a4a0a35aea8ba5ad8b28dc76e04b489663b8eac
SHA512
cb63cb55c136b94f78937c02dedb55af48b9714d296d3f6daea3d8c40d9d290087f2318d7e66fbb48c07658db7ad9c51648c4baddb68dcae1c2a11ed4f1b1d7f
SSDEEP
3072:FW2PR/ZNKHL+Q/URzFevP28OUhSN+7L+:FW2PVZoiQ/UlFsPlO
Checks for missing Authenticode signature.
resource |
---|
57e806463cc9ef89375635c15f0f5d1b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE