DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
093152db83e8f36313271d4381d940b2.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
093152db83e8f36313271d4381d940b2.dll
Resource
win10v2004-20231215-en
Target
093152db83e8f36313271d4381d940b2
Size
91KB
MD5
093152db83e8f36313271d4381d940b2
SHA1
5ae27e2f9315eb4603dc991ee37dc221589bd92c
SHA256
12f9d933a23d8ac4acc35342af84c3c0b0e426c1c9e6b0e182955f366ce7a0d0
SHA512
87dab3de1c3bd7484376401c0447cb45bc0cf2ad8e8320fa984927681b04f58ee45f8ecbaf9dba142fc112f44ad0e673ad0d39fbbb1317e9cff4ceb964b3fcac
SSDEEP
1536:ppZP9VzySkOpEAEg/oULOUPtbDzhFpv9DK6Qr+5iL:LfdkOpzAULPBDzhMxr+8
Checks for missing Authenticode signature.
resource |
---|
093152db83e8f36313271d4381d940b2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE