DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
29040340908bf3c03e87c382b66e2458.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29040340908bf3c03e87c382b66e2458.dll
Resource
win10v2004-20231215-en
Target
29040340908bf3c03e87c382b66e2458
Size
21KB
MD5
29040340908bf3c03e87c382b66e2458
SHA1
a02dab6868b2dbb4e3c6b04ae3eff190fc321802
SHA256
3e050da9a5c09bb32194e213a119e05880b7abe44b66e0b6d2e0cffc11734f76
SHA512
0a74cb99e61ffd6b0ed03eafff93cd82bf09071fe909c67c71cd55a76c9ea10a2f42ac928ac025f520cee8132bad81a6128047ec737c4c066a66da88ad3a2973
SSDEEP
384:g8J2vDyB2MHfpYug5NEBEqBGqRF4vezLPFD3Q65ZGf+KhLTZUT:jJ2IxhYzNKiYKveX5B5dQTZ4
Checks for missing Authenticode signature.
resource |
---|
29040340908bf3c03e87c382b66e2458 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE