DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a45081cdd0409b94e7eb408ba9105b20.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a45081cdd0409b94e7eb408ba9105b20.dll
Resource
win10v2004-20240221-en
Target
a45081cdd0409b94e7eb408ba9105b20
Size
35KB
MD5
a45081cdd0409b94e7eb408ba9105b20
SHA1
09c7c5bac5071475c082a7cca19a2c1cc9708654
SHA256
eb511b8c24003ea4f764b043798398f7d7862c343e9b915a2777131b5539acb8
SHA512
6ab772e56627dd4fd67b41b6bfb497fef7fec6d33a0f31515a65761b090f9b1ed7475c97daf5191f0069536046869e00339819e6a732029a3c2130929138489d
SSDEEP
768:XQoi6qZO1Qegd2GAPgxUf/6SYNldRdVGkJ367u:XQv6qZ4Q35Qg6f/6rP67u
Checks for missing Authenticode signature.
resource |
---|
a45081cdd0409b94e7eb408ba9105b20 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ