DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
12988699a5cb0d7a8b9d135fbb709f50.dll
Resource
win7-20240704-en
Target
12988699a5cb0d7a8b9d135fbb709f50.bin
Size
152KB
MD5
12988699a5cb0d7a8b9d135fbb709f50
SHA1
bf7a286b4ed83610b3d0d6705f2fcf3eff2c4180
SHA256
a13feb932fe11c5b3a39d89212a3e8256dfda9595d9af7ca48928a99c3acdd93
SHA512
4f2c493f9011f73c571ad8e57c71138a3949cb2545ba0d41083c5115ed2ad6c139ab8e9ec53cb174ffc3e4b4a9a6136032c77c86ca1f09f5937621f730c761e0
SSDEEP
3072:NEYkogWTBdqfoYemYvu7/IZlkaboxTo1dpVU/8ew8k:NEcJTTwdFo17VU/l8
Checks for missing Authenticode signature.
resource |
---|
12988699a5cb0d7a8b9d135fbb709f50.bin |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
GetShortPathNameA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
lstrlenW
lstrlenA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
DisableThreadLibraryCalls
DeleteCriticalSection
InitializeCriticalSection
GetLastError
LoadLibraryExA
GetVersionExA
HeapCreate
HeapReAlloc
IsBadCodePtr
GetCommandLineA
GetOEMCP
GetACP
GetCPInfo
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
InterlockedDecrement
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LocalFree
HeapFree
HeapAlloc
TlsGetValue
GetVersion
RaiseException
GetEnvironmentVariableA
RtlUnwind
TerminateProcess
VirtualFree
VirtualAlloc
ExitProcess
TlsFree
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
CharNextA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegDeleteKeyA
RegEnumValueA
RegCreateKeyExA
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
BSTR_UserSize
BSTR_UserMarshal
BSTR_UserUnmarshal
BSTR_UserFree
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SysAllocString
NdrDllGetClassObject
NdrClientCall2
NdrDllUnregisterProxy
NdrDllRegisterProxy
NdrCStdStubBuffer2_Release
NdrDllCanUnloadNow
NdrOleAllocate
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
NdrStubForwardingFunction
NdrStubCall2
IUnknown_QueryInterface_Proxy
NdrOleFree
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE