DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
35d0b95b323127646244d5a61a403916.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
35d0b95b323127646244d5a61a403916.dll
Resource
win10v2004-20231215-en
Target
35d0b95b323127646244d5a61a403916
Size
1.6MB
MD5
35d0b95b323127646244d5a61a403916
SHA1
503df36ca7a116aa32e32988f89dcd8fa449444f
SHA256
6722d83b16eceb7cf594b077e9229433cf50829af45c2efe2cea064d2b920d13
SHA512
937046884aee29bf8ec6a92211b815d2205eabe3cda0d18ed5a6d60d9c7998d319fc4a7a659b301a865d1929c6c5154e2644e3d1dc33996fe1f741d34f0c1f36
SSDEEP
3072:h58nVS9CNRMrdfbkqaX9y8lJupNO2hOtvncB4SMM99QmVK9yB4UZ:hmVMCTMrdbWQ8lJ4NO2hOtvLTm0yB
Checks for missing Authenticode signature.
resource |
---|
35d0b95b323127646244d5a61a403916 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
QueryDosDeviceA
SetWaitableTimer
SearchPathW
CloseHandle
Process32FirstW
SetConsoleScreenBufferSize
SetEvent
PeekConsoleInputA
RtlZeroMemory
QueueUserAPC
FormatMessageA
RtlInitializeGenericTable
RtlAnsiStringToUnicodeString
DestroyCursor
LoadMenuIndirectA
DestroyAcceleratorTable
LoadAcceleratorsW
LoadMenuA
LoadCursorW
LoadAcceleratorsA
LoadMenuW
ChangeServiceConfigA
ResizePalette
SetLayout
PtVisible
GetRandomRgn
GetSystemPaletteUse
SetPixelV
_atodbl
_sys_errlist
free
ldexp
SHDoDragDrop
RasGetProjectionInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ