DllCanUnloadNow
DllGetClassObject
s
Static task
static1
Behavioral task
behavioral1
Sample
60deb8c0e1354594b31e43265b6464ff.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
60deb8c0e1354594b31e43265b6464ff.dll
Resource
win10v2004-20231215-en
Target
60deb8c0e1354594b31e43265b6464ff
Size
57KB
MD5
60deb8c0e1354594b31e43265b6464ff
SHA1
fe5e8945fda753bf3dde88728bbc2cca40affedf
SHA256
774a45ec98da0ec9c386594a77fe62217ed5397d211b806b609c6cd868ee2547
SHA512
c2b608b99892b34e272895164db88ed456bc4bce62ddb15d77494a74e01d96e24caa813edbe5cd65cdf93883455ac25beb1d862cb76668a92a0f7f6b0c3888bd
SSDEEP
1536:E9TYhcGQDf4G7eZG57DIWRBSIeDaAQLZr:mGm49E7D7BSIeDLcr
Checks for missing Authenticode signature.
resource |
---|
60deb8c0e1354594b31e43265b6464ff |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
__dllonexit
??1type_info@@UAE@XZ
strcpy
atoi
wcstombs
towlower
tolower
_onexit
srand
_itow
strlen
mbstowcs
strtok
memcpy
memset
free
malloc
_itoa
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
??_U@YAPAXI@Z
memmove
_XcptFilter
_initterm
_CxxThrowException
_amsg_exit
_adjust_fdiv
?terminate@@YAXXZ
??_V@YAXPAX@Z
rand
_except_handler3
LocalFree
CreateFileW
GetFileSize
VirtualAlloc
ReadFile
VirtualFree
GetModuleFileNameW
lstrcpyW
CreateMutexW
GetLastError
WaitForSingleObject
WaitForMultipleObjects
GetExitCodeThread
lstrlenW
OpenMutexW
GetProcAddress
GetModuleHandleA
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
VirtualFreeEx
CreateToolhelp32Snapshot
Process32FirstW
lstrcmpiW
Process32NextW
GetCurrentProcess
Sleep
FlushFileBuffers
lstrcatW
SetFilePointer
SetEndOfFile
ReleaseMutex
GetModuleFileNameA
DisableThreadLibraryCalls
ExitProcess
LoadLibraryW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetSystemTimeAsFileTime
FreeLibrary
LoadLibraryA
GetLogicalDriveStringsW
GetDriveTypeW
DeleteFileW
GetTickCount
CreateDirectoryW
GetSystemTime
SystemTimeToFileTime
SetFileTime
GetWindowsDirectoryA
GetVolumeInformationA
CreateProcessW
OpenMutexA
WriteFile
GetCurrentThread
Process32First
GetCurrentProcessId
Process32Next
TerminateThread
CreateEventW
TerminateProcess
WideCharToMultiByte
HeapAlloc
GetProcessHeap
HeapFree
SetFileAttributesW
InterlockedIncrement
InterlockedDecrement
GetVersion
InterlockedExchange
InterlockedCompareExchange
RtlUnwind
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateThread
GetVersionExA
CloseHandle
lstrcatA
lstrcpyA
lstrlenA
OpenEventA
PostMessageA
CallNextHookEx
UnhookWindowsHookEx
GetSystemMetrics
SetWindowsHookExA
OpenProcessToken
StartServiceA
QueryServiceStatusEx
QueryServiceConfigA
CloseServiceHandle
SetThreadToken
GetLengthSid
SetTokenInformation
DuplicateTokenEx
SetEntriesInAclA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ChangeServiceConfigA
ControlService
OpenServiceA
OpenSCManagerA
ConvertSidToStringSidW
IsValidSid
GetTokenInformation
SetSecurityInfo
AdjustTokenPrivileges
RegCreateKeyExW
RegDeleteValueW
RegFlushKey
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
LookupPrivilegeValueA
SHGetFolderPathW
CoCreateGuid
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemFree
VariantInit
SysFreeString
VariantClear
SysAllocString
SysStringLen
DllCanUnloadNow
DllGetClassObject
s
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ