DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
54c008961501a1d4cb05e05bf5948e00.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54c008961501a1d4cb05e05bf5948e00.dll
Resource
win10v2004-20231215-en
Target
54c008961501a1d4cb05e05bf5948e00
Size
48KB
MD5
54c008961501a1d4cb05e05bf5948e00
SHA1
a05fcac7f482a6134cc9a0d79663675a989786b3
SHA256
73f2a75aabdd522961141010d3e782bbbdf7a30e6f8139dc391d6a2c9d4b4332
SHA512
b91eba462b911ee34cffa4fcbc33dfe39b7f29e6a3bbfd0ed544bfea3d6324e3d28839b4e7b0c70ea62e470f302b1c8c6e19200e46d66d3428f8442a41165e50
SSDEEP
768:m1SWbVFkuKNC6bQ2SsRwp7cXwvJF2N4fZ00GuVwBwaglGBOLA:qZCuK/U2Op7nvJF2NuBGHw1GBO
Checks for missing Authenticode signature.
resource |
---|
54c008961501a1d4cb05e05bf5948e00 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
DeleteFileA
Process32Next
Process32First
GetCommandLineW
WritePrivateProfileStringA
GetSystemDirectoryA
GetWindowsDirectoryA
InterlockedIncrement
DisableThreadLibraryCalls
LeaveCriticalSection
DeleteCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
Sleep
CreateThread
WideCharToMultiByte
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetCurrentProcessId
CreateEventA
GetLastError
GetLocalTime
InitializeCriticalSection
CloseHandle
DispatchMessageA
FindWindowExA
CreateWindowExA
ShowWindow
SetWindowTextA
IsWindow
CallNextHookEx
RegisterClassExA
KillTimer
SetTimer
PostMessageA
DefWindowProcA
GetMessageA
TranslateMessage
SendMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
_purecall
strstr
_strlwr
strcmp
strchr
fopen
fwrite
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
fclose
??2@YAPAXI@Z
_access
strcat
strcpy
strrchr
rand
strlen
memcpy
memset
??3@YAXPAX@Z
sprintf
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ