DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
05b66a4aad530982b7cb8fe6dec3ce63.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05b66a4aad530982b7cb8fe6dec3ce63.dll
Resource
win10v2004-20231215-en
Target
05b66a4aad530982b7cb8fe6dec3ce63
Size
48KB
MD5
05b66a4aad530982b7cb8fe6dec3ce63
SHA1
9ed581083db5d440a9fee20aa665ad11bed2efd1
SHA256
e11e2856f0f6c76da645b6fbce93a6b40e4a9a1e2178d0ba19cacdac46ae54a0
SHA512
434738bd2ef69d6f68c5f0ee2e7e29c2fc28c82ee1b0157902a07f517b1d8316fdb2226ccec699661ed621797301cdbe497ac94be877c7f43d9a177d3e02b42a
SSDEEP
768:FStfmGGPp1824Mz0K7YHgBQuKgg5t52o6YsSow/2d+ykFLBj0A3ZqT2FKRAOkpfe:FS4GGh1T4w04YHo/gTFow2bkRBI+irRp
Checks for missing Authenticode signature.
resource |
---|
05b66a4aad530982b7cb8fe6dec3ce63 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrlenA
GetProcAddress
GetLocalTime
WritePrivateProfileStringA
Process32Next
Process32First
GetLastError
CreateEventA
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
CreateThread
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCommandLineW
Sleep
GetCurrentProcessId
GetSystemDirectoryA
GetWindowsDirectoryA
DeleteFileA
LoadLibraryA
CloseHandle
DisableThreadLibraryCalls
GetModuleFileNameA
SetWindowTextA
SendMessageA
IsWindow
GetMessageA
TranslateMessage
CallNextHookEx
KillTimer
SetTimer
CreateWindowExA
ShowWindow
FindWindowExA
PostMessageA
DefWindowProcA
RegisterClassExA
DispatchMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_purecall
strcat
_strlwr
strcpy
strstr
strcmp
memset
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
??2@YAPAXI@Z
strchr
fopen
fwrite
fclose
_access
sprintf
rand
strlen
memcpy
strrchr
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ