DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2ee4b88bc6eb5e5e421bf678e15717a0N.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ee4b88bc6eb5e5e421bf678e15717a0N.dll
Resource
win10v2004-20240709-en
Target
2ee4b88bc6eb5e5e421bf678e15717a0N.exe
Size
100KB
MD5
2ee4b88bc6eb5e5e421bf678e15717a0
SHA1
1684feacbefd815ac1da8e47bde55932a57d09ee
SHA256
5c2db85cc7fd6c70460ca10ecb2fca1734373df65c6be0eaf478a0b920b5573b
SHA512
f720ce30becd0caab09325747ef484c22d69ff762b1b1f54ef48f951c46599051786bafd72a435a014734dffad933ea213b2d8fd11b4de03bd8d9e3424a1d23d
SSDEEP
1536:Li+sVqgdE+2bcrbvxmyhNohej8JKcbKHpUgj+MA1ALvE4CVAhV:GUgdE+2IRmMNoThbKHrCVcV
Checks for missing Authenticode signature.
resource |
---|
2ee4b88bc6eb5e5e421bf678e15717a0N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord4622
ord561
ord4080
ord3079
ord4424
ord3738
ord3953
ord2393
ord3663
ord2841
ord2448
ord2725
ord1131
ord5834
ord6394
ord6467
ord3830
ord4465
ord6383
ord2044
ord2107
ord4486
ord6375
ord815
ord540
ord861
ord941
ord939
ord539
ord600
ord269
ord1601
ord800
ord823
ord3825
ord3831
ord3081
ord3401
ord2976
ord3136
ord2985
ord3262
ord860
ord3259
ord825
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord3903
ord5440
ord858
ord5450
ord826
ord1255
ord1253
ord1578
ord1197
ord1243
ord1570
ord1182
ord1577
ord342
ord1575
ord1116
ord1176
ord1168
free
memmove
strcmp
malloc
memset
sin
sqrt
fabs
memcpy
__CxxFrameHandler
_purecall
atan
memcmp
_except_handler3
__dllonexit
_onexit
_initterm
?terminate@@YAXXZ
??1type_info@@UAE@XZ
realloc
pow
cos
fmod
_adjust_fdiv
_CxxThrowException
FindResourceA
SizeofResource
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
HeapDestroy
DebugBreak
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
OutputDebugStringA
lstrlenW
WideCharToMultiByte
InterlockedDecrement
lstrcmpiA
lstrcpynA
LoadLibraryExA
GetProcAddress
LoadLibraryA
IsDBCSLeadByte
lstrcatA
LocalFree
lstrcpyA
LoadResource
LocalAlloc
GetLastError
CharNextA
wsprintfA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
CoTaskMemAlloc
OleRun
CoTaskMemRealloc
CoTaskMemFree
StringFromCLSID
CoCreateInstance
VariantChangeType
VarUI4FromStr
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
VariantInit
VariantCopy
SysAllocStringByteLen
VariantClear
GetErrorInfo
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ