DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
4621a2a2004409db22a936bae2ce858c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4621a2a2004409db22a936bae2ce858c.dll
Resource
win10v2004-20231215-en
Target
4621a2a2004409db22a936bae2ce858c
Size
145KB
MD5
4621a2a2004409db22a936bae2ce858c
SHA1
bb16b331f6ec1ec2f9e8c59e52a714d892bd8085
SHA256
e72d60894fab83bf1401c9ddbe2dc40d1a28ba601845e14898884e4424e93c41
SHA512
64942d82640ec10d381f5b5520a5ab7f72ef13d95ef1e0399c7b73da927b9ac78f12644b21f9c5ba406eeefc62447b9585b39a55fbc128a3f60506f312a47cde
SSDEEP
3072:zcAicSfUSP0479BCL8ijPNa28ii5IN3tAu9JorxRUc8MmyCxx:/MUm0Tzc2O03qu9Jo1RUc8T
Checks for missing Authenticode signature.
resource |
---|
4621a2a2004409db22a936bae2ce858c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ