DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
cc53e20679e6cb93ce31ef76fab444ca.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc53e20679e6cb93ce31ef76fab444ca.dll
Resource
win10v2004-20240226-en
Target
cc53e20679e6cb93ce31ef76fab444ca
Size
167KB
MD5
cc53e20679e6cb93ce31ef76fab444ca
SHA1
e3ba921b4f023d68832e38e1b50f145f94ba740d
SHA256
813936f1acf9f13f5547cfa731ea000e02e2d6bd55754ccda8cc4d881e13e2c7
SHA512
b122b05a6cf8b02261cdef873b41c6b0a88bf13c090471b1c83d4b16b61a2fa255f47ac5a504f5153333fa81da8ff6c8df0e560deb04174c38a3388e0f79f468
SSDEEP
3072:4C16v1kHqhMx8X9PLs60F6GHqc3wzJah:ACqh/9PJ0F6GQzIh
Checks for missing Authenticode signature.
resource |
---|
cc53e20679e6cb93ce31ef76fab444ca |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE