DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JHookOff
JHookOn
Static task
static1
Behavioral task
behavioral1
Sample
2cdb4816c660185b61503ea28f3ec6be.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2cdb4816c660185b61503ea28f3ec6be.dll
Resource
win10v2004-20231215-en
Target
2cdb4816c660185b61503ea28f3ec6be
Size
88KB
MD5
2cdb4816c660185b61503ea28f3ec6be
SHA1
b348622beed90616600027c8d61b536869c08a50
SHA256
9ebea680ddd4b8b605e69e6239ab02162d4b82de164177596355bd7982d207e0
SHA512
5a383048c61624bd71ced780da504bb2e907a2f09f88e2bc44b29490f40fb726482948ac31a076d91c99d07f7ea7cdaec6f21407a782db7b74c16af30deba6d5
SSDEEP
1536:poqPQEikqNUGCe4H6z7R/JZJDjzwVpXx1XWX9Ryk:dV+NUGj3ljNjzwfXxAXbyk
Checks for missing Authenticode signature.
resource |
---|
2cdb4816c660185b61503ea28f3ec6be |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JHookOff
JHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ