DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.26c7091fd630eee2e990b780434947d0.dll
Resource
win10v2004-20231023-en
Target
NEAS.26c7091fd630eee2e990b780434947d0.exe
Size
144KB
MD5
26c7091fd630eee2e990b780434947d0
SHA1
9175d84979a57ef3dcb4ed7e28168136740a01f4
SHA256
c8cc09d058ced919a0e92ed3cbb6a2f421185fdd7350f5a37804df1ec2a6d5d5
SHA512
809b334703b51851483d182c7175b0788dc85bdc59731f43a01aadc471338c216504e2b3682797ba8104174d050846b699de38844d2de49238e04d643589be6b
SSDEEP
3072:Tzd13+UzJmuv+OYRHzTlUzj7SrHm18k24uV46N5ya34GQcH:TbHzJmLH+kmuLNpN9f
Checks for missing Authenticode signature.
resource |
---|
NEAS.26c7091fd630eee2e990b780434947d0.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
realloc
??1type_info@@UAE@XZ
_lock
__CxxFrameHandler3
__dllonexit
_onexit
memcmp
_errno
_except_handler4_common
?terminate@@YAXXZ
_initterm
_amsg_exit
_XcptFilter
memset
_callnewh
calloc
memmove_s
_purecall
wcscat_s
wcscpy_s
memcpy_s
free
malloc
wcsncpy_s
_unlock
_CxxThrowException
memcpy
SysStringLen
SysAllocString
LoadTypeLi
UnRegisterTypeLi
LPSAFEARRAY_UserFree
VarUI4FromStr
BSTR_UserFree
LPSAFEARRAY_UserSize
LPSAFEARRAY_UserUnmarshal
LPSAFEARRAY_UserMarshal
BSTR_UserUnmarshal
SysFreeString
BSTR_UserSize
BSTR_UserMarshal
RegisterTypeLi
GetTraceEnableLevel
TraceMessage
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableFlags
GetTraceLoggerHandle
GetModuleFileNameW
LoadResource
SizeofResource
GetProcAddress
LoadLibraryExW
DisableThreadLibraryCalls
GetModuleHandleW
FindResourceExW
FreeLibrary
PropVariantCopy
PropVariantClear
CoCreateFreeThreadedMarshaler
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
CoTaskMemFree
CoCreateInstance
CharNextW
RaiseException
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
MultiByteToWideChar
Sleep
GetCurrentProcess
TerminateProcess
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
OutputDebugStringA
CStdStubBuffer_Disconnect
NdrDllGetClassObject
NdrDllRegisterProxy
CStdStubBuffer_DebugServerRelease
IUnknown_QueryInterface_Proxy
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_IsIIDSupported
NdrDllCanUnloadNow
CStdStubBuffer_Connect
NdrOleFree
CStdStubBuffer_AddRef
NdrOleAllocate
CStdStubBuffer_QueryInterface
CStdStubBuffer_CountRefs
IUnknown_AddRef_Proxy
NdrDllUnregisterProxy
CStdStubBuffer_Invoke
NdrCStdStubBuffer_Release
IUnknown_Release_Proxy
lstrcmpiW
UnregisterClassA
PropVariantToInt32
PropVariantToUInt32
PropVariantToStringAlloc
PropVariantChangeType
PropVariantToUInt64
PropVariantToInt64
PropVariantToBoolean
PropVariantToGUID
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ