DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JpHookOff
JpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
b455cbbbc8d29a926421a0ab519072f2.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b455cbbbc8d29a926421a0ab519072f2.dll
Resource
win10v2004-20240226-en
Target
b455cbbbc8d29a926421a0ab519072f2
Size
62KB
MD5
b455cbbbc8d29a926421a0ab519072f2
SHA1
3d137214b6ba0da3072e55ccc5c1ff3cef322a4b
SHA256
85d34bb732bc150dd5785a16c85e51771cc84cc6606c7fd04a01c8ffbdb7815f
SHA512
90ddc3973f549130f01c5594efe0585d1293fe026ebf538bd6c1d96878bc36181904374b0053b5027633e15dfba1f391c3fcfb1ad4b7d66ad3b3961b9a860674
SSDEEP
1536:ZSt2ATNcfvNymoKag8iSL4VWLH4tOtrbTAw2tprwT:WJmf38cUB3/2rrw
Checks for missing Authenticode signature.
resource |
---|
b455cbbbc8d29a926421a0ab519072f2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JpHookOff
JpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE