?COMWndProc@@YGJPAUHWND__@@IIJ@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3fb09bfca24f090d9b8ffd76798b2bcd.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3fb09bfca24f090d9b8ffd76798b2bcd.dll
Resource
win10v2004-20231215-en
Target
3fb09bfca24f090d9b8ffd76798b2bcd
Size
296KB
MD5
3fb09bfca24f090d9b8ffd76798b2bcd
SHA1
f4131b1011ef0b51d7c90b1740b1813243422da7
SHA256
a99e7ce39f4359318b566895a6e0aa5dc37c59733168df36255b444782537f8b
SHA512
c3831141ff6c29f65914ad0c37dda2e34f16d07d210911c6a20d9720d9056d1eaebacbbd2aabb9a6f9e6096f01b1321913e90e70599bcf99733c6c585d12302d
SSDEEP
3072:410wpssPb/wwyWPBykvp0zvz08ZPQL88RUZ6Y0pREm0SBmSMXO14L9g71BcokxoN:IssjjYkivr45hxLWc3+qZWC082
Checks for missing Authenticode signature.
resource |
---|
3fb09bfca24f090d9b8ffd76798b2bcd |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
VirtualAlloc
InterlockedIncrement
CloseHandle
DuplicateHandle
GetCurrentProcess
DeleteCriticalSection
FlushInstructionCache
LocalFree
GetPrivateProfileIntA
GetPrivateProfileStringA
LocalAlloc
WritePrivateProfileStringA
HeapDestroy
InitializeCriticalSection
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
GetLastError
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenW
DisableThreadLibraryCalls
lstrlenA
EnterCriticalSection
LeaveCriticalSection
OpenProcess
MultiByteToWideChar
FormatMessageA
DefWindowProcA
GetWindowLongA
LoadStringA
CharNextA
wsprintfA
RegOpenKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
CoTaskMemFree
CoTaskMemAlloc
ProgIDFromCLSID
CoTaskMemRealloc
CoInitialize
CoUninitialize
CoCreateInstance
SafeArrayCreate
SafeArrayDestroy
SafeArrayLock
SafeArrayUnlock
VariantCopy
DispCallFunc
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
VariantClear
SysAllocString
SysStringLen
SysAllocStringLen
SysFreeString
SysAllocStringByteLen
CreateErrorInfo
SetErrorInfo
calloc
_mbschr
iswctype
_isctype
__mb_cur_max
_initterm
_adjust_fdiv
__dllonexit
_onexit
__CxxFrameHandler
atoi
_pctype
_ltoa
_mbsnbcpy
_purecall
memcmp
memset
??2@YAPAXI@Z
realloc
malloc
free
wcscmp
memcpy
??3@YAXPAX@Z
atol
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?COMWndProc@@YGJPAUHWND__@@IIJ@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ