DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3c7c8db4d554c49a8c373d57151fe712ea5d6fc0fe7d0bef85767aca8231f435.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c7c8db4d554c49a8c373d57151fe712ea5d6fc0fe7d0bef85767aca8231f435.dll
Resource
win10v2004-20240802-en
Target
3c7c8db4d554c49a8c373d57151fe712ea5d6fc0fe7d0bef85767aca8231f435
Size
1.3MB
MD5
f29766040dacaa417cd519359b232e80
SHA1
4aeb5d54d691dd98ba4dabb52e5f8fe6bab6ac63
SHA256
3c7c8db4d554c49a8c373d57151fe712ea5d6fc0fe7d0bef85767aca8231f435
SHA512
b86218853c7ae03a3bd1a9d3239347012a493feffb70671b4b5bb3d30ddda0b59b5ae4da851311ecca2a35b11d25143fe83a21f7f1f60fd5f78a96f0f266f45b
SSDEEP
12288:4gt9F8dSanPQ0VgkztPTm9qqpaWWx7FwFwrUyw9x3jk6Emzfs2yZrdS/ZSXi3P39:rzFYI0GaBY2Ex3j9zq0/L7Nnrws
Checks for missing Authenticode signature.
resource |
---|
3c7c8db4d554c49a8c373d57151fe712ea5d6fc0fe7d0bef85767aca8231f435 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
vDbgPrintExWithPrefix
SystemFunction036
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
EnumResourceNamesW
FileTimeToLocalFileTime
FindResourceW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetEnvironmentVariableA
GetLastError
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
MultiByteToWideChar
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
lstrlenW
__dllonexit
_amsg_exit
_assert
_initterm
_iob
_lock
_onexit
_unlock
_wcsicmp
_wcsnicmp
abort
acos
asin
atan
atan2
bsearch
calloc
cos
exp
fmod
free
fwrite
isalnum
iswctype
log
log10
malloc
memcmp
memcpy
memmove
memset
pow
sin
sprintf
sqrt
strchr
strcmp
strcpy
strcspn
strncmp
swprintf
tan
towlower
towupper
vfprintf
_vsnprintf
wcschr
wcscmp
wcsncmp
wcsstr
wcstol
CLSIDFromProgID
CoGetClassObject
CoTaskMemFree
SafeArrayAccessData
SafeArrayCopy
SafeArrayDestroy
SafeArrayGetDim
SafeArrayGetElement
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
VariantChangeTypeEx
VariantClear
VariantCopy
VariantInit
LoadStringW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ