DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
c29e5f25d5371756b6eb6a60017727f7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c29e5f25d5371756b6eb6a60017727f7.dll
Resource
win10v2004-20240226-en
Target
c29e5f25d5371756b6eb6a60017727f7
Size
82KB
MD5
c29e5f25d5371756b6eb6a60017727f7
SHA1
d70174b0d90523ef871ba5fc71b4773de481e104
SHA256
5ab5fb7c2e457df2249f8857726f34a4aaa98027ef86b6400341ad9d80103afe
SHA512
c3f239f66770c10e732011eff3352647cc29830ee802468012ff385882f86754917dc26cced86591c471f1ca28bc351415c63bed45762e804f9a19a2d7848ebf
SSDEEP
1536:hqplkWvpltfGzr55uq6ROA8ZHpgwyCDvHcpDBKs7jWjMAWqf:0peWBbUSq6sA8ZHpgwyjpDBDjh5qf
Checks for missing Authenticode signature.
resource |
---|
c29e5f25d5371756b6eb6a60017727f7 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE