DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
dddbf3ad34a44c22421203bdb0ea876a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dddbf3ad34a44c22421203bdb0ea876a.dll
Resource
win10v2004-20240226-en
Target
dddbf3ad34a44c22421203bdb0ea876a
Size
52KB
MD5
dddbf3ad34a44c22421203bdb0ea876a
SHA1
1aa1ce8412307e62dbd12dd5bbadd647ad743128
SHA256
8628050518e654fddb2f18ba7f14520c8855d4aeb12614876d0abfeeccb628aa
SHA512
437c8f396c82218673ce966384403a25eb597d5aad7587eca76223d36344610c847c075494f60c25967254beeee19b273158f9bd44f18f4fd070db61a8ff13d1
SSDEEP
384:c4iIdxk4P+6zq2ZIAlIIBJyeXRl5iiXD3vfB3UIVkZqh39O4FhYv/csxZ1:c4pbk4O2OAlImRlnXTJXS8xMv/Dv
Checks for missing Authenticode signature.
resource |
---|
dddbf3ad34a44c22421203bdb0ea876a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Module32Next
Module32First
GetProcAddress
ExitProcess
SuspendThread
OpenThread
OpenProcess
VirtualProtectEx
WriteProcessMemory
CreateToolhelp32Snapshot
GetCurrentProcessId
lstrlenW
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
LoadLibraryA
VirtualProtect
DisableThreadLibraryCalls
GetCurrentProcess
TerminateProcess
CreateEventA
CreateThread
OpenEventA
SetEvent
CloseHandle
Sleep
GetModuleFileNameA
WinExec
MessageBoxA
GetWindowThreadProcessId
SetWindowsHookExA
wsprintfA
CallNextHookEx
EnumWindows
RegSetValueExA
RegOpenKeyA
RegCloseKey
SysFreeString
SysStringLen
LoadRegTypeLi
ord16
ord21
ord15
ord23
ord18
ord57
ord58
ord30
ord32
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
strncpy
strrchr
isprint
sprintf
memmove
free
_initterm
malloc
_adjust_fdiv
_itoa
_strcmpi
strstr
StrStrIA
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ