DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
e149177d4aaff65a0b6f0d3c93760151.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e149177d4aaff65a0b6f0d3c93760151.dll
Resource
win10v2004-20240319-en
Target
e149177d4aaff65a0b6f0d3c93760151
Size
50KB
MD5
e149177d4aaff65a0b6f0d3c93760151
SHA1
318eaa9c28b3cbde1d3c1781ad84401c71aa614f
SHA256
daaea4561372e52b75735aef5e77945552612218dd058a90c06e5fef64d96e1a
SHA512
94d1a13b773ffceba40b4f726b7a7e64f5eaebd3751637d91d5ec0716b7f92404743646ce427dc99c3864c1ab8918b7415df72719360e631848c0c932a134c56
SSDEEP
1536:C82SHaXKXfpdvSutjtIoP5OKMqfsln00g/7C/:C8/HaauKkKMPntr/
Checks for missing Authenticode signature.
resource |
---|
e149177d4aaff65a0b6f0d3c93760151 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE