DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
70f7124058682438390576c670fbd920.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70f7124058682438390576c670fbd920.dll
Resource
win10v2004-20231215-en
Target
70f7124058682438390576c670fbd920
Size
158KB
MD5
70f7124058682438390576c670fbd920
SHA1
2881e7ab17827a1fd34d8f84ae1c68b3d973acdb
SHA256
0234af790b23b1c976b13b6170d62430724e2f8f7e4e4abfb8e36b253abc5ae1
SHA512
a44dacac7b2675d5c2149ddfb2f89d1c258688e917884b371b92c2c3a3c8f9e506c873b31614da741afa3057e84f7d6c78c25f147e4ddedf02b2bb541f27176a
SSDEEP
3072:koPcFi+Au2p6vL8VLwcE8hXEIL+5XKngIjpC/sZ:5+nQ4INwb8h0IK5agIt7
Checks for missing Authenticode signature.
resource |
---|
70f7124058682438390576c670fbd920 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE