DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
78a1dcf2db26c9253c84f75064620855.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78a1dcf2db26c9253c84f75064620855.dll
Resource
win10v2004-20231215-en
Target
78a1dcf2db26c9253c84f75064620855
Size
140KB
MD5
78a1dcf2db26c9253c84f75064620855
SHA1
34fe9f2dbebd66ae61b279232abdb0ec06dacc84
SHA256
8311620d2fd3350532c804c3cb93c95da19bfa0d6ff1abb11a99a3d569b8b6ac
SHA512
1f307bf16553058edf880a6b981a1222783d430fbc868a02ad9b62ba0ad28abc976018092a367d4aafe800499e0f887320066dba0bb7f0ad6c13666bf1d6cd09
SSDEEP
1536:ZriEuwO2hOxw/4qqH93kICNODqYEmGVQLUSmHrrmrnbm8NWX:ZriZRK/QkIjBEmTUS+erbNNWX
Checks for missing Authenticode signature.
resource |
---|
78a1dcf2db26c9253c84f75064620855 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE