HookOff
HookOn
StartHook
Static task
static1
Behavioral task
behavioral1
Sample
4b90c747d6937c71db7ef710527da549.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b90c747d6937c71db7ef710527da549.dll
Resource
win10v2004-20231215-en
Target
4b90c747d6937c71db7ef710527da549
Size
27KB
MD5
4b90c747d6937c71db7ef710527da549
SHA1
c3d299bd50627b7d1e44906109da9375653b870c
SHA256
1867d062dc4dc011223fedcfe2ab33148012bfd0f6216e282ed6d02fede7ac18
SHA512
3537c00fb2aac113c418e9673d70db0cbd470bd35c4ec1fb01b5663e195af1f74406db83a3f3e0b17695ee819b33f4842d569208c00b121b7f4f7c162671b243
SSDEEP
768:fKSQquzz0GQgrKbRgCj0y7OkZFlXPBN6QIgK:lQquzz0GQaCnF57vK
Checks for missing Authenticode signature.
resource |
---|
4b90c747d6937c71db7ef710527da549 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
HookOff
HookOn
StartHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ