DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
1408df97726557e1767ba0594876090336dda53ee3c463a21edb041758c40237.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1408df97726557e1767ba0594876090336dda53ee3c463a21edb041758c40237.dll
Resource
win10v2004-20231023-en
Target
1408df97726557e1767ba0594876090336dda53ee3c463a21edb041758c40237
Size
586KB
MD5
2d2a869f1a003d0ba566092030c2285d
SHA1
f38b86a936d3c80f959718f2094bdb32610e82ef
SHA256
1408df97726557e1767ba0594876090336dda53ee3c463a21edb041758c40237
SHA512
581906876282a8d8e94701bacb398ea5d106cfec0ffba7fa9a510cccbc87cda5fda367c25fe64404ba5c81d5dc406c079e85d9082453584c014e3d2f9b053379
SSDEEP
6144:f5aR5iBIXI5pk0C5QDuN/PH8CZMVcIQvbIckaNI4by:QR5iWXn05DuN/Pl6sbIct5
Checks for missing Authenticode signature.
resource |
---|
1408df97726557e1767ba0594876090336dda53ee3c463a21edb041758c40237 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
SystemFunction036
DisableThreadLibraryCalls
EnumResourceNamesW
FileTimeToLocalFileTime
FindResourceW
GetDateFormatW
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrA
IsBadStringPtrW
LoadLibraryW
LoadResource
MultiByteToWideChar
SizeofResource
Sleep
WideCharToMultiByte
DeleteCriticalSection
EnterCriticalSection
GetLastError
InitializeCriticalSection
LeaveCriticalSection
TlsGetValue
VirtualProtect
VirtualQuery
_amsg_exit
_assert
_finite
_initterm
_isnan
_lock
_unlock
_vsnprintf
_vsnwprintf
_wcsicmp
_wcsnicmp
acos
asin
atan
atan2
bsearch
cos
exp
floor
fmod
free
isalnum
iswalnum
iswalpha
iswdigit
iswspace
log
log10
malloc
memcmp
memcpy
memmove
memset
pow
sin
sqrt
tan
towlower
towupper
wcschr
wcscmp
wcsncmp
wcsstr
wcstol
__p__iob
_iob
_strdup
abort
calloc
fputs
fwrite
getenv
strncmp
vfprintf
_snprintf
sprintf
strchr
strcmp
strcpy
strcspn
strlen
CLSIDFromProgID
CoGetClassObject
CoTaskMemFree
SafeArrayAccessData
SafeArrayCopy
SafeArrayDestroy
SafeArrayGetDim
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
VariantChangeTypeEx
VariantClear
VariantCopy
VariantInit
LoadStringW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ