DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
14b5642e3fa1349443d685659e99c6e9.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14b5642e3fa1349443d685659e99c6e9.dll
Resource
win10v2004-20231215-en
Target
14b5642e3fa1349443d685659e99c6e9
Size
140KB
MD5
14b5642e3fa1349443d685659e99c6e9
SHA1
d18c4c1d90592c491db7495bfaf2a37b2049de13
SHA256
475e1d639b691a67b28a3d51c42de25ed62cc18bb261ba2e44045b087d72c7db
SHA512
db79349a7e3d446834470cd4dda49f00ffbb85d65510b2a032c23aec1178aa6ea2021a2e2ec6b8576c7344e115b88ed3d816c045efbd9b78c501af69bbc77637
SSDEEP
1536:U88kj4aeSk8VMTNoErctl1+V2Ba21D+ufZBipA88ETyJFiS9AT:U8oaeSkCMaacoVsa10ZBq9JT1v
Checks for missing Authenticode signature.
resource |
---|
14b5642e3fa1349443d685659e99c6e9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE