DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
3a0afd6413557673503b8a099ac4edec.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a0afd6413557673503b8a099ac4edec.dll
Resource
win10v2004-20231222-en
Target
3a0afd6413557673503b8a099ac4edec
Size
74KB
MD5
3a0afd6413557673503b8a099ac4edec
SHA1
d93569125bdb7bc46e971a83629a39b88d596a2d
SHA256
7dae2892f47776c3499e70d4503c2e46155f7d6d07e1bc36c0d67064da796c7f
SHA512
be6f3446f9214c11479d322595ea2370e9cebccc9c0b315433ae6ef0cb1c9fb00762b432533fad3cce92f5f131d680ebb14cfb17af5b0553faa3cf571cc196d0
SSDEEP
1536:7uFoFLm/li0idgdaVvFoJsJTaIG5JC4U+YPxuhjINpYKF5vYDFe:7IJ/lTH+m+JhG5LwuiDYKIDk
Checks for missing Authenticode signature.
resource |
---|
3a0afd6413557673503b8a099ac4edec |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE