DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
5b561d33800f8433437e56bc4aa94c70.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b561d33800f8433437e56bc4aa94c70.dll
Resource
win10v2004-20231215-en
Target
5b561d33800f8433437e56bc4aa94c70
Size
106KB
MD5
5b561d33800f8433437e56bc4aa94c70
SHA1
401cce26dc5b09165ede145c2edc215871891bf0
SHA256
4e261c0eedc2c2fecaaf270ebb58847cc080b056c4b6d942c6e265ce91087a59
SHA512
621dc7b04c877d8c48a2a4a55784ca6ae24e471916ec73a65f73008bc2651b51d5c94c380ba6c86d60f90bfcdb9d9d33c587c5215ed3c585cb0bbe803c6e4e30
SSDEEP
3072:aBMprarUkqZXZ5HiUs8Zw1hMI7rATA3pK4YwN9y6:aWp2rUbVi3UOZZN
Checks for missing Authenticode signature.
resource |
---|
5b561d33800f8433437e56bc4aa94c70 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ