DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
8cb184c579e49ddc446a84ef07ef96c6.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8cb184c579e49ddc446a84ef07ef96c6.dll
Resource
win10v2004-20231215-en
Target
8cb184c579e49ddc446a84ef07ef96c6
Size
158KB
MD5
8cb184c579e49ddc446a84ef07ef96c6
SHA1
9a32e7db6d75e01c81fa3765fd71ada0bafcd4e4
SHA256
5072d96ee3fcfd2d147bb77632232f7d78ce656c9e76c55a667946c3ef3f34a6
SHA512
47397deacf2774afc540ab60287b30467295799c61830afaababc5117085286307083ce93a59f3d51a301f8856d987968660abeda960eaf3e4b2adf3578207d6
SSDEEP
3072:KlANOeKeVle7Yc/tYszUbt//B8xd9wwlDdYc/t:KyNcB7Pta//B6/dP
Checks for missing Authenticode signature.
resource |
---|
8cb184c579e49ddc446a84ef07ef96c6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE