DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
68771346a86fa06a803fe2093baf182d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
68771346a86fa06a803fe2093baf182d.dll
Resource
win10v2004-20231215-en
Target
68771346a86fa06a803fe2093baf182d
Size
138KB
MD5
68771346a86fa06a803fe2093baf182d
SHA1
0ae1e3325dc1e43dc12097a0a9c6df456e8c75a8
SHA256
06729461fe248112b74086712a3079de727fa140685ede5d27f81c739063232e
SHA512
0cd484463f21e26fe6f0116173dee7e3d6ba771bb64a851d95653f0328cc8b59a33375bc5ab59e23d6e468ba64ba9984da4529d304851f8c97c425eae2e0c6c2
SSDEEP
3072:VeLKAHUBgqJ0pfPhKLZgO+0zIZoDYPcWc9KUyhZ:omAUBWXKLZdkPcWcY
Checks for missing Authenticode signature.
resource |
---|
68771346a86fa06a803fe2093baf182d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ