DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
901a4876e55b75beda03efeda08271fc.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
901a4876e55b75beda03efeda08271fc.dll
Resource
win10v2004-20231222-en
Target
901a4876e55b75beda03efeda08271fc
Size
86KB
MD5
901a4876e55b75beda03efeda08271fc
SHA1
00b4eb50ebfcc3fd3331f968618824ddab5da304
SHA256
458d6a4ee2b6846e282bf5a51129d519eddc92064d4a38581abd24507dec3f1f
SHA512
f8583bb5b32cae1cb728d9fecb121636f2fce1d6ac82b87e83ec90bef9bde83f415b49f7982c8f7ccab773ab87cece8abeca5047547f43892ee4dd9832e787b3
SSDEEP
1536:bp1JVQgHX1+6Xf9rFbrVJWtaUquyCiqcCM+0RsVEnULpZ0jJs84B:XVf9hbrfWrqlCz0+inUjv84B
Checks for missing Authenticode signature.
resource |
---|
901a4876e55b75beda03efeda08271fc |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE