DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3fbd4e25e404eaa5e50833817f66f39f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3fbd4e25e404eaa5e50833817f66f39f.dll
Resource
win10v2004-20231215-en
Target
3fbd4e25e404eaa5e50833817f66f39f
Size
48KB
MD5
3fbd4e25e404eaa5e50833817f66f39f
SHA1
50d4552febe776c3951988b038c1ff03c9af06d5
SHA256
715ba5891364436fa907adc76b6a3ef5aea9729913b55debc067da3e11d13b4f
SHA512
4de4f134440579c1c631790b6c8adcf8c7d7b563790d11aeab199112b7f7c9af922035c04b0dc71526cbd3977a2cfc6027d9e023c1dff8523016ee8d88c6b4da
SSDEEP
768:eYbZHvCt/7bXjrTgS4dXLD4V+819syetCymGr7Vzj:e6NOTqLD4L9shAymGp
Checks for missing Authenticode signature.
resource |
---|
3fbd4e25e404eaa5e50833817f66f39f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
CloseHandle
GetLocalTime
Sleep
HeapAlloc
WideCharToMultiByte
Process32Next
Process32First
CreateToolhelp32Snapshot
GetWindowsDirectoryA
GetSystemDirectoryA
GetLastError
CreateEventA
GetCurrentProcessId
DeleteFileA
GetCommandLineW
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
CreateThread
WritePrivateProfileStringA
SetWindowTextA
SendMessageA
RegisterClassExA
GetMessageA
TranslateMessage
DispatchMessageA
IsWindow
CreateWindowExA
ShowWindow
FindWindowExA
KillTimer
SetTimer
PostMessageA
DefWindowProcA
CallNextHookEx
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
rand
_stricmp
strchr
fopen
fwrite
fclose
strlen
free
_initterm
malloc
_adjust_fdiv
_strlwr
strrchr
strstr
strcmp
strcpy
memcmp
memcpy
memset
??2@YAPAXI@Z
_purecall
sprintf
??3@YAXPAX@Z
_access
strcat
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ