DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
4b415c7d11a8de91962606d771bf4464.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b415c7d11a8de91962606d771bf4464.dll
Resource
win10v2004-20231215-en
Target
4b415c7d11a8de91962606d771bf4464
Size
140KB
MD5
4b415c7d11a8de91962606d771bf4464
SHA1
b3058565b35656629e205d55d23f164d7d3acdb3
SHA256
1d37ca894457b3ef08cb1c7327131f58ae143e8118e1750eaf03b762e2a59157
SHA512
d8bb5334f5f7e0abadd609f801a60adc7b7c39975dc7cf5edc61889697a454f637663e64ef77042734787fd36bef3cfd79bbf6391669c77e1c43a6a818c711ba
SSDEEP
1536:dDU1XBe6wpn69pAUoUv4yPJRPF0h8k79Pl5E0HW6JxqRvr2HZVuwt:+Ap69B48RPFidkjvAZAa
Checks for missing Authenticode signature.
resource |
---|
4b415c7d11a8de91962606d771bf4464 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE