DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a353e1cf05a247e605561c539d502384.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a353e1cf05a247e605561c539d502384.dll
Resource
win10v2004-20240221-en
Target
a353e1cf05a247e605561c539d502384
Size
71KB
MD5
a353e1cf05a247e605561c539d502384
SHA1
4c4e95c2da87edbe8eed11a974737e792a0a23d9
SHA256
359b6684a0c1a9ba9801aaef9f8059c597645933094fa759a4ad32fcfa670090
SHA512
622e581f311241f3853252c77db04dd8065427be597686957445964af88b31fee5219b9145816cfa0f8b3316fe7972b0c09b6a4d3affaaf303274f510d3effb4
SSDEEP
1536:6OrHg3yyZhBTMFXR0OVJX0x+u0SGc+1LanHaskcr:6ObcFzTMN/JXODTGc+1Lan6s/r
Checks for missing Authenticode signature.
resource |
---|
a353e1cf05a247e605561c539d502384 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE