DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
4edda896a8f8e099638ed75c89e4a07a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4edda896a8f8e099638ed75c89e4a07a.dll
Resource
win10v2004-20231215-en
Target
4edda896a8f8e099638ed75c89e4a07a
Size
39KB
MD5
4edda896a8f8e099638ed75c89e4a07a
SHA1
eb77607adb97a2e1785188299c14aa5cbb6948c1
SHA256
1bc56cc6d87109be2f0e18842e4ee2bb109428ab0f998ec56aba1d74a1fa9d0e
SHA512
4225617802a696088bfd8b0aff049a81c1222cb05c2a6920dbac0cff7b8313fcf6242f44f46cc45d9206563f137c0bf33df7e8d1942ee944f67655a44b2162f9
SSDEEP
768:cySqg5Qh3gv69ZyCll6a98c4/xDINXdNP+1yP6VExMdipX2tIr2XY:bSqg5Qhwy94Cir/x4dF+sP6VGPV6lY
Checks for missing Authenticode signature.
resource |
---|
4edda896a8f8e099638ed75c89e4a07a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ