DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
a3750115a61be221742c49451b42a279.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3750115a61be221742c49451b42a279.dll
Resource
win10v2004-20240221-en
Target
a3750115a61be221742c49451b42a279
Size
147KB
MD5
a3750115a61be221742c49451b42a279
SHA1
8c454cc97f5d9d37889326fec17dce0265d25951
SHA256
eac1e06da99a477bbf6681a1718e86949fcaf3e96e93b883f30fe9513b26782c
SHA512
8e5f658a9821a926e4755d6d68e4394c489a236bc5c782309eadcd9d4f5750d6902f41083307060b6ad11c85dbbeeefacbe482f0d3bc9eeb97efeed678d16c37
SSDEEP
3072:/omcNLVUW0BZ1qXmJUqs6M1QYkOTQLYAPG3yG:/NcNVUWsBJ+/DHyYA
Checks for missing Authenticode signature.
resource |
---|
a3750115a61be221742c49451b42a279 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ