DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
99494c2ef3ba1e88069f0ff810146cc6.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99494c2ef3ba1e88069f0ff810146cc6.dll
Resource
win10v2004-20231215-en
Target
99494c2ef3ba1e88069f0ff810146cc6
Size
167KB
MD5
99494c2ef3ba1e88069f0ff810146cc6
SHA1
544e0ae01aae175f4a7d2cff439603720a7d643c
SHA256
e4587c33f763f8dd2090032aa77d2f36bba078b1e2bb5646876df6877b2effc0
SHA512
563bfd009c67fbe8fa44b27698e2d0cd003176a8d60a2305a8b135ee394bb9be987d82987d4ba95fb7c3ac90a959c9ee1c47e9be93f8e79d20ec85b9b333d265
SSDEEP
3072:lUJ4n5YLyvQX9LMhYf0Ny1s7tMLHshDp5iSgSEQ3:mJ4aLyoX9ACf0NyItMLHWlIS93
Checks for missing Authenticode signature.
resource |
---|
99494c2ef3ba1e88069f0ff810146cc6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE