DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ca44ce8d75273808783bac421a2e6725.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca44ce8d75273808783bac421a2e6725.dll
Resource
win10v2004-20240226-en
Target
ca44ce8d75273808783bac421a2e6725
Size
140KB
MD5
ca44ce8d75273808783bac421a2e6725
SHA1
c4d6f0ead4d1be833aa871894883308f3dd9463b
SHA256
cb2fe8772d3cee497697dd51ed0cfa3ac388638f3a756ec8306c91d0571caf36
SHA512
7a96c38d6cb0fb4b2fb931b6125635a375531018f0e7f0b5f6d83b144faa119fa4c88af16dc25442095a80371d7f06822bf74c2d1cf2a7b678a18781238a5bc9
SSDEEP
1536:5TZ4plgEdH+SOMRwWV3YzQPPLIit7t+TtwlTq4JA2jmD:l+lySOMd3YqMitZ+BG7jc
Checks for missing Authenticode signature.
resource |
---|
ca44ce8d75273808783bac421a2e6725 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE