DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
e0482024a28f6484a3cab0da77939fb4.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e0482024a28f6484a3cab0da77939fb4.dll
Resource
win10v2004-20231215-en
Target
e0482024a28f6484a3cab0da77939fb4
Size
140KB
MD5
e0482024a28f6484a3cab0da77939fb4
SHA1
631ecd77c90d7da4447ad7509834534ef5cf11b9
SHA256
bb198e554c19e56e84b96d29f2b5bc47511ca981f6216131c18613b52ab5c489
SHA512
2fa49acdbe1d8fee72f808386d3a510bcf6bcfa50d9bee78bfdbc8baa297bd8728e1b0b89f7f2672b401c360be9e50184fa7ddeb88736a93f5207bf58647b5d1
SSDEEP
3072:pgciilIUU4UCCBgJJJXz7GVU2tmtdUn9q3z0oeiyS:o8U54V2QT4/
Checks for missing Authenticode signature.
resource |
---|
e0482024a28f6484a3cab0da77939fb4 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ