DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
4a5a0db04967425aabe9d3b73470c896.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a5a0db04967425aabe9d3b73470c896.dll
Resource
win10v2004-20231215-en
Target
4a5a0db04967425aabe9d3b73470c896
Size
59KB
MD5
4a5a0db04967425aabe9d3b73470c896
SHA1
526298d2456f698d4a696da6786a21c8d3e53550
SHA256
edbef9cf8a5e7723ccf89701a37368d3b13793e49feefbd7e1a9501d70d108a4
SHA512
83b503a375f2d97954926954ef0dd81bd3cb63978c8d4bd503ab71094e16b7e4cba71f56e6bc5039b16807ea7cf1780140b3a302207591031511f7eae477e925
SSDEEP
1536:vIyrU9gwX1itmWFU0ZWEXmt+DhdweAxj0HIrjw4eL2:vIaObitmWFnWqmLfw
Checks for missing Authenticode signature.
resource |
---|
4a5a0db04967425aabe9d3b73470c896 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE