DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
41edf7e65de351bde85492355859be7c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41edf7e65de351bde85492355859be7c.dll
Resource
win10v2004-20231215-en
Target
41edf7e65de351bde85492355859be7c
Size
138KB
MD5
41edf7e65de351bde85492355859be7c
SHA1
e1ddcd5464c1d33b69d6b51a8f58d6b68fdb4f25
SHA256
4ce9f4e205e78165c8ae06440322dca6f7e4639ad3ed998b4b659aed2b7a15a7
SHA512
db5de15452790a4d753e24b106b6fa8e67e3ea7ff89e7966d4c4cf7fe63d60401d86b1127a83d5b6f2b4622ce743170ee0a34f96665a8bdf9a8a40015ccdea70
SSDEEP
3072:tNLetoU06SvkgSP3Fv7ODzID7J2EJh4rpFu3ihyhJ:XCWUmm1v7ODkx4rpFKi
Checks for missing Authenticode signature.
resource |
---|
41edf7e65de351bde85492355859be7c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ