DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
424d1d758f11c7932af6b1d8a5fc3f90.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
424d1d758f11c7932af6b1d8a5fc3f90.dll
Resource
win10v2004-20231215-en
Target
424d1d758f11c7932af6b1d8a5fc3f90
Size
99KB
MD5
424d1d758f11c7932af6b1d8a5fc3f90
SHA1
b30c3230de650d4d42cb6e39f2e72a93cb01f733
SHA256
cab22ffb490cf2cd3dc5cd0ce6b83cd30687865323323fb4e0ab352c936a206b
SHA512
f18603dc570b31a793fd56aca551237e399714801db1de8e7424b184a5dc82af08ef8ff6843d40d9945a20e5eefa6da4168e96abe94f7cf179b2ab4a2f0be42c
SSDEEP
1536:Xh5Lrr6t6zVT5XKmKuzS4U6f9QiBqndedZ9dRLz1KmOLraGHhNTyXQNUr2Bsn:XDLHFVt6wbaqZv9ziraONTyXmUCKn
Checks for missing Authenticode signature.
resource |
---|
424d1d758f11c7932af6b1d8a5fc3f90 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
InterlockedIncrement
LeaveCriticalSection
InterlockedDecrement
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
CreateEventA
Sleep
IsDBCSLeadByte
SetEvent
WaitForSingleObject
InitializeCriticalSection
GlobalGetAtomNameA
GlobalDeleteAtom
GlobalAddAtomA
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
CompareStringA
OutputDebugStringA
lstrcpynA
lstrcmpiA
LoadLibraryExA
GetLastError
FindResourceA
LoadResource
WideCharToMultiByte
SizeofResource
FreeLibrary
lstrlenA
GetModuleHandleA
GetShortPathNameA
GetModuleFileNameA
MultiByteToWideChar
lstrlenW
CloseHandle
WaitForMultipleObjects
DisableThreadLibraryCalls
LocalFree
DestroyWindow
EnumWindows
wsprintfA
PostMessageA
KillTimer
SetTimer
DefWindowProcA
IsWindow
MessageBoxA
CallWindowProcA
CreateWindowExA
RegisterClassExA
LoadCursorA
GetClassInfoExA
FindWindowExA
GetClassNameA
LoadStringA
SetWindowLongA
CharNextA
GetWindowLongA
GetDesktopWindow
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
CoInitialize
IIDFromString
CreateItemMoniker
OleRun
CLSIDFromString
CLSIDFromProgID
CreateBindCtx
CoUninitialize
CoGetCurrentProcess
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
ProgIDFromCLSID
SafeArrayAllocDescriptor
LoadTypeLi
RegisterTypeLi
VariantClear
SysFreeString
SafeArrayAllocData
SafeArrayGetElement
SysStringLen
SysAllocStringLen
SetErrorInfo
CreateErrorInfo
SysStringByteLen
VariantInit
VariantChangeType
SafeArrayUnaccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElemsize
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayUnlock
SafeArrayRedim
SafeArrayLock
SafeArrayDestroyDescriptor
SafeArrayDestroy
SafeArrayDestroyData
VariantCopy
SafeArrayGetDim
LoadRegTypeLi
VarUI4FromStr
SysAllocString
SafeArrayCreate
SafeArrayCopy
SafeArrayAccessData
GetErrorInfo
ord2
ord7
ord1
ord14
ord5
ord6
memset
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
strlen
wcslen
strcpy
malloc
__CxxFrameHandler
realloc
_mbsrchr
memcpy
free
memmove
_beginthreadex
memcmp
_CxxThrowException
atoi
wcscmp
_purecall
strcmp
??2@YAPAXI@Z
strcat
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ