DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
4440e6742580b98c40ef4347aeb4607a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4440e6742580b98c40ef4347aeb4607a.dll
Resource
win10v2004-20231222-en
Target
4440e6742580b98c40ef4347aeb4607a
Size
137KB
MD5
4440e6742580b98c40ef4347aeb4607a
SHA1
d458f20f443962fdad983be57b1803df68a74453
SHA256
1a46095e35c71d1bbe5cc882456133f334e366f675d7a58f9f27bc7282ad149e
SHA512
d493470c4b75565f366d9439fa2a6b8a408d6fa25a760fd89fcb61a12d3c4a7209af24a35f9983a921dbbf72faa83b33eaaeedf2242cd34775e4bae7c699fac8
SSDEEP
3072:aMLu+kFaUVrGndTr7HF4XqEuHCJrMC+I5AzsPNpAzyhD:RRJUGHZ4Xq5iJt5Azs
Checks for missing Authenticode signature.
resource |
---|
4440e6742580b98c40ef4347aeb4607a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ