DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
b8df5abbb226d13051e8514276ca1315.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8df5abbb226d13051e8514276ca1315.dll
Resource
win10v2004-20240226-en
Target
b8df5abbb226d13051e8514276ca1315
Size
140KB
MD5
b8df5abbb226d13051e8514276ca1315
SHA1
b4c0afa619f665322859d8f60b4247dbe70aeb76
SHA256
03cca5523865631e161dce87f2d82165d37f413407b6d6830e10b6668ce59bd0
SHA512
4141d06f919e970e06551913bbe0f4e4d6568a663c152c5122ac0bda8cd0e360eedf22b2124a03de3921a79aaf901b60f4dc413ef8a9a20346126482510b2765
SSDEEP
1536:Wx8/cXa7nmZwi2Zln/HPQXhN3DHos7kx2l8aVii:Wx8/cXa7XiifiN3DHos7cmVh
Checks for missing Authenticode signature.
resource |
---|
b8df5abbb226d13051e8514276ca1315 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE