DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
99ee96c36066e624be821c9a4cbd913b.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
99ee96c36066e624be821c9a4cbd913b.dll
Resource
win10v2004-20231215-en
Target
99ee96c36066e624be821c9a4cbd913b
Size
167KB
MD5
99ee96c36066e624be821c9a4cbd913b
SHA1
d876382604f80e92ee9edd926b5ee3a570e49214
SHA256
9d68b844d5e0134402b1b88ccdba94108c4897ed8a1248dc4b83c7edbf3da62b
SHA512
feed28fd36c8cb5faca2c93dbed9a041ac1dbc79c2bcef2f14aad8ff2a13e1039561baace97945038640d89e0a26f4c6a91ac3f1077621f03af4d7f09dfe98ce
SSDEEP
3072:mW2OHiKlSPNRKPiv8VMcwmXwcjyV0fJneX:vPC1uPikV5wUwFix
Checks for missing Authenticode signature.
resource |
---|
99ee96c36066e624be821c9a4cbd913b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE