DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
2a18a541966c70a508eb3398bab1694e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a18a541966c70a508eb3398bab1694e.dll
Resource
win10v2004-20231215-en
Target
2a18a541966c70a508eb3398bab1694e
Size
85KB
MD5
2a18a541966c70a508eb3398bab1694e
SHA1
efabcf366b66f7bf9d63d1127ecb7afc415d25b9
SHA256
50ef46b3eb3123532675a44db5cbee8aba14e1d02ce179ead9641eb1e7c2f535
SHA512
f8746b9acc4e5132fb1dd415d3601decf664c93fa78c55260b616b47af6344253549b86332220da39c8644efe5d7df6eba631d2a3a08b1703eef322955edbb4d
SSDEEP
1536:48IHr5L4320hU2PGsZAwlO0Tl2KGYwVjB2YeDenMkKHUSzkYEy:t2r5L4320G2jlbTl29vjB29eMESgC
Checks for missing Authenticode signature.
resource |
---|
2a18a541966c70a508eb3398bab1694e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE