DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
275b6885a1d2b13458ef41ebd3531445.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
275b6885a1d2b13458ef41ebd3531445.dll
Resource
win10v2004-20231215-en
Target
275b6885a1d2b13458ef41ebd3531445
Size
432KB
MD5
275b6885a1d2b13458ef41ebd3531445
SHA1
5a54e8f280fcbb711fafb8c3f2cae255d1acfc4a
SHA256
36f5e09a3b7f6814a805137403d0c55c8899642a66bf5038547a8fdddd72b786
SHA512
d0fc69a0e73e23cbcddfeca19a0c5a94498b813586958babb3cf5d48c0169a8957057e12eb07301b8cbcc8b80885acf20b2c1f1a2ebd6273232b8acec3a93ec3
SSDEEP
6144:F/gxI5p8RCAJL0OFLm1I7AV4COHEQeewQeelQeesQeeudQeefQeeZKwQBIoqhvJ7:SxI5uLM1aw4CIoqhKZUBG/9K
Checks for missing Authenticode signature.
resource |
---|
275b6885a1d2b13458ef41ebd3531445 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadResource
FindResourceW
LoadLibraryExW
CloseHandle
WaitForSingleObject
SetEvent
OutputDebugStringW
VirtualFree
FlushInstructionCache
GetCurrentProcess
QueryPerformanceFrequency
QueryPerformanceCounter
InterlockedCompareExchange
LoadLibraryA
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SizeofResource
lstrlenA
lstrcatW
FindResourceA
GetModuleHandleA
GetVersionExA
IsProcessorFeaturePresent
LockResource
DisableThreadLibraryCalls
LoadLibraryW
GetProcAddress
FreeLibrary
GetModuleFileNameW
lstrcpynW
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
lstrcmpiW
InterlockedDecrement
HeapAlloc
GetProcessHeap
HeapFree
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
GetLastError
lstrcpyW
lstrlenW
MultiByteToWideChar
VirtualQuery
GetSystemInfo
VirtualAlloc
Sleep
DelayLoadFailureHook
VirtualProtect
GetVersionExW
??3@YAXPAX@Z
sprintf
exit
calloc
?terminate@@YAXXZ
_except_handler3
_adjust_fdiv
_initterm
rand
time
srand
_ftol
_wcsicmp
_purecall
??2@YAPAXI@Z
realloc
free
malloc
wcspbrk
wcschr
_vsnwprintf
_CIacos
_finite
__CxxFrameHandler
longjmp
_setjmp3
isdigit
isspace
_CIpow
floor
RegQueryValueExA
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyA
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
SysAllocStringLen
LoadRegTypeLi
VarUI4FromStr
SysStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SetWindowLongW
GetWindowLongW
CallWindowProcW
CallNextHookEx
GetAsyncKeyState
DestroyWindow
UnhookWindowsHookEx
UpdateWindow
ShowWindow
SetWindowsHookExW
IsWindowUnicode
CreateWindowExW
RegisterClassW
LoadCursorW
DefWindowProcW
PostMessageW
SetCursor
CopyRect
SetRectEmpty
IsRectEmpty
GetSystemMetrics
GetDC
FillRect
IsWindow
ReleaseDC
MonitorFromWindow
GetWindowRect
GetClientRect
CharNextW
CharPrevW
DeleteObject
SetStretchBltMode
TextOutW
SetTextAlign
SetTextColor
SetBkColor
StretchBlt
GetStockObject
timeGetTime
timeBeginPeriod
timeEndPeriod
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ