DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JpHookOff
JpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
14c792a7998189d4198878bde934a2b1.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14c792a7998189d4198878bde934a2b1.dll
Resource
win10v2004-20231215-en
Target
14c792a7998189d4198878bde934a2b1
Size
80KB
MD5
14c792a7998189d4198878bde934a2b1
SHA1
7a565ccc88de19fa6bf79b38d052c22c362185ed
SHA256
3621ac2f41ee513bed9d0cb31545e46e7e454203404402d65841c4edff55bc49
SHA512
74ffa6ef60c96b23e788668262889fb1912eaa37c8a128471eb134cabc088d05938693a922d49f8eca727d46da39f96f226a7ff5e2b23839fe0b1324850b5cf4
SSDEEP
1536:s4t1S1ZADvq38DYf+XXbNlzj7iZaTLEzzVqY9Ixh4P03rn+:zDS1KDvqCKElzHiWEzxWc0bn+
Checks for missing Authenticode signature.
resource |
---|
14c792a7998189d4198878bde934a2b1 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JpHookOff
JpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE