DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
b7bec693921820d5c556c951fa7b0d6c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7bec693921820d5c556c951fa7b0d6c.dll
Resource
win10v2004-20240226-en
Target
b7bec693921820d5c556c951fa7b0d6c
Size
34KB
MD5
b7bec693921820d5c556c951fa7b0d6c
SHA1
8af2eee611b19218037abc80ef9b7283f0d447dc
SHA256
30242aaa99232db3e611481f2b3ed6f31b04f5d3111d0a8cc15e3531e80f81e2
SHA512
a5b485f8fbb2e871c1608dd0e713f944edd3556bdefd448ca18181a4c817321a3f62d715663a4a6b9bec06f765a6ba2a2819563c9618b09e6bdb60dd3c5df62d
SSDEEP
768:nQoi6qZO1Qegd2loF/V7zH0S2yDd2mLJ3+AF:nQv6qZ4Q3pT3H0Er+AF
Checks for missing Authenticode signature.
resource |
---|
b7bec693921820d5c556c951fa7b0d6c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOf
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ