DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
1932f9820239dcc122d7e2dc6e085ddc.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1932f9820239dcc122d7e2dc6e085ddc.dll
Resource
win10v2004-20231215-en
Target
1932f9820239dcc122d7e2dc6e085ddc
Size
158KB
MD5
1932f9820239dcc122d7e2dc6e085ddc
SHA1
3eb9cf2a320a4d695834b7f68d81a380c461f00e
SHA256
4793a765beff4bf52214dcb68ebf946f2d19a0738f11c7c69830604829b187e4
SHA512
3a19a1ae6b91c3e74f5c7508fd5848740ecf19a36cf86404754a5e48155f8a72db8e211f9a79a998580580c6efe4a88eb4db7182f5a1820f2f5464a7522c8ef4
SSDEEP
3072:WP8lWbnody1kjyZszUbt//B8xd9xqEjb0Pcj:WP8lWzoYSjDa//B6dvfj
Checks for missing Authenticode signature.
resource |
---|
1932f9820239dcc122d7e2dc6e085ddc |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE