DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
426c06bde8bfadb3ee18a165151b4fb6.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
426c06bde8bfadb3ee18a165151b4fb6.dll
Resource
win10v2004-20231215-en
Target
426c06bde8bfadb3ee18a165151b4fb6
Size
158KB
MD5
426c06bde8bfadb3ee18a165151b4fb6
SHA1
9ae1823802d60185761b750f3ff0cda9a9827f2b
SHA256
78723d39672e70ecd991ab72a8733c9e7eb2b7e0fa4e42289f95cfbbc0291b8d
SHA512
138854f71257092f46f7cb2fff7cf0f8cf0586c05028491b2f2f6ed41be56d326eeef9f5d3e8ae30116788db17d480e80883c3eb4348328c420c823e5d43cfcb
SSDEEP
1536:HagxsoNNfjpeWQmbZ0BIUE4JRpie/WLoD1+ipFxb:HBORmbZ0BIa0eeLwsiHxb
Checks for missing Authenticode signature.
resource |
---|
426c06bde8bfadb3ee18a165151b4fb6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE