DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
3ec13028d4631b4720c4dd657bc18433.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ec13028d4631b4720c4dd657bc18433.dll
Resource
win10v2004-20231222-en
Target
3ec13028d4631b4720c4dd657bc18433
Size
90KB
MD5
3ec13028d4631b4720c4dd657bc18433
SHA1
1f25876eb7fda1abb25dff1bf8c4fc2c15cf7761
SHA256
b5646f85760176b48897c120f30c7149f283cb6a9fa78b860cb01b10bf0d0ccd
SHA512
6c6ef52c9560e3001d3d5ddef80c362fd8290c498d9adb22cce715a646851151c5d2feb4907cb4c8f36077ac970bf5f701630321a4bc17aabf2f57d6d823fe63
SSDEEP
1536:3spVE4VYAMEYKb2kkqmmkES24hzwoxAafhfbmAzD5J1Yrps9+36GXB:kjYAhJrdmI4dxAmbmAz71YMorB
Checks for missing Authenticode signature.
resource |
---|
3ec13028d4631b4720c4dd657bc18433 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE