DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
7760e4cb1174456941ff60200280c538.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7760e4cb1174456941ff60200280c538.dll
Resource
win10v2004-20231215-en
Target
7760e4cb1174456941ff60200280c538
Size
103KB
MD5
7760e4cb1174456941ff60200280c538
SHA1
afdd595ae9a8b6dd671b64e56cc9664804d8edc9
SHA256
ff167875556aa0791c99fe8f1c0393cc57e38a36039301d95b95f4466ad85984
SHA512
f6aa7fc817bdc7d3d4ed413b9a596310cfe769182622faf71e2b34b0532b8f165666b3c023a572decd969ac6ca577c4aa109d8d60bff5aa7afd3e3f36b72acab
SSDEEP
3072:QIgOX64zpkaQhGyqMr5U9ZhrqSvpXcotwoKbfA3r69Fg:Q1Oq4faGAU/IoKbfe
Checks for missing Authenticode signature.
resource |
---|
7760e4cb1174456941ff60200280c538 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ