DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
Static task
static1
Behavioral task
behavioral1
Sample
badaa32620da70156501f5d027e94580.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
badaa32620da70156501f5d027e94580.dll
Resource
win10v2004-20240226-en
Target
badaa32620da70156501f5d027e94580
Size
120KB
MD5
badaa32620da70156501f5d027e94580
SHA1
0c7d86f248ea37db5693901cd59034a02604af6c
SHA256
c6db1bb098f627a26208cc6aac1c0711bbe56328e04673a6a3214e239a5c86f4
SHA512
f043fe8a4503f7987399aff35c7139f8f0bcd5b76484ec02a14e723e7de4821df2609f5ff7d1ee86ad66752322ff6dacaa5cb57f659f775b3c31d96b5fd047fd
SSDEEP
1536:IoqWQ4AAp40cfnUkN2NxQVbtAXBXoyoOKNz78i:dxAN0mUdMAIP7r
Checks for missing Authenticode signature.
resource |
---|
badaa32620da70156501f5d027e94580 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpOff
JumpOn
ThreadPro
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE