DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
040e41c4897b601c9a388aaa682bec3a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
040e41c4897b601c9a388aaa682bec3a.dll
Resource
win10v2004-20231215-en
Target
040e41c4897b601c9a388aaa682bec3a
Size
86KB
MD5
040e41c4897b601c9a388aaa682bec3a
SHA1
34738a93190d8d569a62f038d8d80301bd6072e7
SHA256
8101dd33533b7b3f153b3471cf3f5419829c2d4ffa8e89f7ec7479410466c114
SHA512
40676f22e2be0e8cbed447decd7dff1e2da87b3eea9449a4b07cb1f56b28b9201beacd646c1ff218f2776c60c48031d70b09345d42cce09c30b70766f6876208
SSDEEP
1536:haZK6rEc4N2etKU5sz4rbaZo5lXoUn/Bn8xg5iWqUi8jKVF+Zet7:haIsEntBszUbt//B8xd9v8jeDt7
Checks for missing Authenticode signature.
resource |
---|
040e41c4897b601c9a388aaa682bec3a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE