DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
b47ea0c323660bcdf677c382774293d8.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b47ea0c323660bcdf677c382774293d8.dll
Resource
win10v2004-20240226-en
Target
b47ea0c323660bcdf677c382774293d8
Size
86KB
MD5
b47ea0c323660bcdf677c382774293d8
SHA1
2e064be02bf803bc5e03461640cbe28c652d6765
SHA256
a70d348b4729cf13f43cdaead5fd3099a0256345199f600ea17234322e986417
SHA512
37a2175ff1fc5e5ecc2fb43ae94570a2cc6829915a00495a661de23556640b5defca836274e57c66c7e7e0f796593dc47e35c9d53a89ca6ec148f03c0adb18a8
SSDEEP
1536:hKsdoHt1bs1xkzc4Z+8jHtB216+cjLPB8lzNQSb0wG:hKsdoHt1byxWrjHj2kt35AQSa
Checks for missing Authenticode signature.
resource |
---|
b47ea0c323660bcdf677c382774293d8 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE