DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
04cd8d535fa824209ae59f40945919b5.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04cd8d535fa824209ae59f40945919b5.dll
Resource
win10v2004-20231215-en
Target
04cd8d535fa824209ae59f40945919b5
Size
34KB
MD5
04cd8d535fa824209ae59f40945919b5
SHA1
7d446a1245f4431154fe5db0923fc1fa55db311c
SHA256
ff839a2b4f68f68681e0575607f1fbdfc9b370bdaea73d376ae2377226ec05fb
SHA512
3208dd6704590d7d70873b85ee97fbfacadc030cff764aae2b443f15024d7f810c24aa5d2e9c24647e054ee85ab62b51e4725f6257baf29800a5ed78975e7121
SSDEEP
768:tcoiwqZOvQ9z3CSEpMMw0c2R69uK/W+mYJtvr6J5:tcvwqZWQ9z3upzHa9uKu+v2J5
Checks for missing Authenticode signature.
resource |
---|
04cd8d535fa824209ae59f40945919b5 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ