acrxEntryPoint
acrxGetApiVersion
Static task
static1
Behavioral task
behavioral1
Sample
95056abb4b28e0e78a11dd1c0a90b0feadb11324ce8139e7ce396ed3eddffa91.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95056abb4b28e0e78a11dd1c0a90b0feadb11324ce8139e7ce396ed3eddffa91.dll
Resource
win10v2004-20240412-en
Target
95056abb4b28e0e78a11dd1c0a90b0feadb11324ce8139e7ce396ed3eddffa91
Size
74KB
MD5
2935a3e3dc2c67e81e4f64ec90710507
SHA1
83c42cce15bc61035c1e55644a11be79795ed77c
SHA256
95056abb4b28e0e78a11dd1c0a90b0feadb11324ce8139e7ce396ed3eddffa91
SHA512
d4f30c61e3d0047102dbe286d49dc771b7654d9559a0325784ea3792c59ff893ceda627dcb8b59720929383bbc93d0cc8ea421f91286f19f22006688174f1eb7
SSDEEP
1536:3SRydfvzYyH0hnZNH3yG0vRoZ+0OtJPySV:F1vzYyUhnZNQvWZ9OtJPySV
Checks for missing Authenticode signature.
resource |
---|
95056abb4b28e0e78a11dd1c0a90b0feadb11324ce8139e7ce396ed3eddffa91 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_getdrive
fread
fwrite
memset
_getcwd
strncat
_makepath
_access
calloc
localeconv
memcpy
_chdrive
fgets
strncpy
_splitpath
wcstombs
vsprintf
mbstowcs
_strnicmp
_mkdir
__clean_type_info_names_internal
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
strrchr
_findclose
_findfirst64i32
_difftime64
_localtime64
_strdup
_time64
memmove
_stricmp
_strlwr
_chdir
_unlink
_strupr
feof
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_except_handler4_common
free
strtok
atoi
??2@YAPAXI@Z
_CxxThrowException
sscanf
strstr
strcmp
strcat
fopen
fprintf
fclose
__CxxFrameHandler3
setlocale
strchr
strcpy
strlen
sprintf
malloc
??3@YAXPAX@Z
IDX_Analyse
ads_unload_dialog
acedRetNil
?acedRestoreStatusBar@@YAXXZ
ads_start_dialog
adsw_acadMainWnd
ads_action_tile
acedRetVoid
acedGetFunCode
acedGetAppName
acedMenuCmd
acedCommand
acedIsMenuGroupLoaded
ads_term_dialog
acedGetArgs
acedAlert
acedFindFile
acedArxUnload
acedRetStr
acedUndef
acedDefun
acedGetVar
acedSetVar
ads_set_tile
ads_load_dialog
ads_new_positioned_dialog
??1AcadAppInfo@@UAE@XZ
?writeCommandNameToRegistry@AcadAppInfo@@QAE?AW4ErrorStatus@AcadApp@@PB_W0@Z
?writeGroupNameToRegistry@AcadAppInfo@@QAE?AW4ErrorStatus@AcadApp@@PB_W@Z
?writeToRegistry@AcadAppInfo@@QAE?AW4ErrorStatus@AcadApp@@_N0@Z
?setLoadReason@AcadAppInfo@@QAEXW4LoadReasons@AcadApp@@@Z
?setAppDesc@AcadAppInfo@@QAEXPB_W@Z
?setModuleName@AcadAppInfo@@QAEXPB_W@Z
?setAppName@AcadAppInfo@@QAEXPB_W@Z
??0AcadAppInfo@@QAE@XZ
?acrxUnlockApplication@@YA_NPAX@Z
?acrxRegisterAppMDIAware@@YA_NPAX@Z
?close@AcDbObject@@QAE?AW4ErrorStatus@Acad@@XZ
acutPrintf
acutRelRb
ord1241
ord391
ord1137
ord266
ord265
ord1152
MultiByteToWideChar
GetModuleFileNameA
GetModuleHandleA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
Sleep
MessageBoxA
GetActiveWindow
GetOpenFileNameA
CommDlgExtendedError
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
ShellExecuteA
SHGetSpecialFolderPathA
SHDeleteKeyA
acrxEntryPoint
acrxGetApiVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ