DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
63b06b2419de289565e5e122f2d0fee7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63b06b2419de289565e5e122f2d0fee7.dll
Resource
win10v2004-20231222-en
Target
63b06b2419de289565e5e122f2d0fee7
Size
74KB
MD5
63b06b2419de289565e5e122f2d0fee7
SHA1
b9c9ad3bdf467b3c51980366c5e8ccb73fc50ef8
SHA256
190a68b162d2407d3e64a8489782e1376755c21479ee50479a588f0c822d6eb3
SHA512
8d81fe7d7535b5945baa7ad7e132095d0b0891a5e7da4e3730f9a12e0c7423b99961b92a909847e768b276e7aa1023f66d9bf255cf1ffe5f69233b393d9051ae
SSDEEP
1536:UVqglpAQfq3bMVFKwmooU5wnJAL68v1blhPZ6N7RIrPdK:OyP3bMVIwToarL68vNP3rVK
Checks for missing Authenticode signature.
resource |
---|
63b06b2419de289565e5e122f2d0fee7 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ