DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
e13ebff4c807e0fe043eb83372dda970.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e13ebff4c807e0fe043eb83372dda970.dll
Resource
win10v2004-20240319-en
Target
e13ebff4c807e0fe043eb83372dda970
Size
140KB
MD5
e13ebff4c807e0fe043eb83372dda970
SHA1
cc7e4575d33c8d9e94d2e7cc07951abb4f3e6cc4
SHA256
99b0d7a1ae7473dabb84e43022375f5803b191829050102b64146b5129da7f71
SHA512
7474d74aca4841e9dddebeebbe8a751842b0c7754aaeaddbae06000e7852d03a18d41f5efcda81f000ffd41c77802081756f046b651b5c1659bb2ba8abfa6dfd
SSDEEP
1536:W1dPAAiS05QENA3GV1gPu92DDRPF0h8k79Pl5E0HW6phEfasJ2p1l:W11AXN5Qs4GORPFidkahEysJ2p1l
Checks for missing Authenticode signature.
resource |
---|
e13ebff4c807e0fe043eb83372dda970 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE