DllCanUnloadNow
DllGetClassObject
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
360ef5625ef8d3f426c870058e2fc2ce7988c9cd0c5460f180245db0b2671bd0.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
360ef5625ef8d3f426c870058e2fc2ce7988c9cd0c5460f180245db0b2671bd0.dll
Resource
win10v2004-20240508-en
Target
360ef5625ef8d3f426c870058e2fc2ce7988c9cd0c5460f180245db0b2671bd0
Size
118KB
MD5
91ac19ce4e75de009a33c5ee6f43e69a
SHA1
7e84d96b290036d73d545cb898bf0fec5de13427
SHA256
360ef5625ef8d3f426c870058e2fc2ce7988c9cd0c5460f180245db0b2671bd0
SHA512
f94b25956754745a167e70eb0c03e3b13c4ad4ded39180cf270c6c6806d2932af02668ca298b5d644496fe1ad8c793fefcea5b7867a15d85cc7aa751698a9914
SSDEEP
1536:eFaZTEiyRXh81wnXdOC2092WnU1DF5q6hpChaoMlq2eFPaE0cnGsGY+D6AN:eFaZTEfhZ23WnU1B5q63ZlFlm+D6A
Checks for missing Authenticode signature.
resource |
---|
360ef5625ef8d3f426c870058e2fc2ce7988c9cd0c5460f180245db0b2671bd0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReleaseStgMedium
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
CloseHandle
CompareStringA
CreateDirectoryA
CreateFileA
CreateFileW
CreateProcessA
DeleteCriticalSection
DeleteFileA
DeleteFileW
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetNumberFormatA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
IsDBCSLeadByte
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LocalFileTimeToFileTime
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
Sleep
SystemTimeToFileTime
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrcpynW
ord8
CreatePropertySheetPageA
DestroyPropertySheetPage
CreateFontA
CreatePen
CreateSolidBrush
DeleteObject
GetTextFaceA
GetTextMetricsA
Polygon
Polyline
SelectObject
SetBkColor
SetTextColor
TextOutA
DragQueryFileA
DragQueryFileW
SHGetPathFromIDListA
BeginPaint
CharLowerA
CharLowerW
CharToOemA
CharUpperA
CharUpperW
CreatePopupMenu
EndPaint
EnumThreadWindows
GetClassNameA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetParent
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongA
GetWindowRect
GetWindowTextA
InsertMenuItemA
InvalidateRect
LoadStringA
MessageBoxA
OemToCharA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
wsprintfA
DllCanUnloadNow
DllGetClassObject
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ