DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6da577b369cea48a4fb3fedb1263de87.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6da577b369cea48a4fb3fedb1263de87.dll
Resource
win10v2004-20231222-en
Target
6da577b369cea48a4fb3fedb1263de87
Size
48KB
MD5
6da577b369cea48a4fb3fedb1263de87
SHA1
60750f600fe1bf40d1d650af481d6a7487c63c7a
SHA256
c181dbc3a039ae73283db441d804863d3720be926c7ebc9ef485bb1b384cae5f
SHA512
f909ff1db1790515ebf33a9e418f9a3389ae2802995ddb07cf27f8a493da06acc869a2579c76ef06e790df70e916c7bbbabc438cad711229c66dbad400567e50
SSDEEP
768:98x/LHYiBYolBDVFE9U/wfZhUuxW0flJZeN9eFA8u6bm1:9EY6LDN/mMGVeAJE
Checks for missing Authenticode signature.
resource |
---|
6da577b369cea48a4fb3fedb1263de87 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WritePrivateProfileStringA
GetWindowsDirectoryA
GetSystemDirectoryA
Sleep
CreateThread
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrlenA
LeaveCriticalSection
EnterCriticalSection
GetLastError
GetCommandLineW
Process32Next
Process32First
InterlockedIncrement
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateEventA
GetLocalTime
GetModuleFileNameA
GetCurrentProcessId
LoadLibraryA
GetProcAddress
DeleteFileA
CloseHandle
PostMessageA
IsWindow
CallNextHookEx
KillTimer
SetTimer
RegisterClassExA
SetWindowTextA
SendMessageA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
DefWindowProcA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_purecall
strstr
_strlwr
rand
memcpy
strchr
fopen
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
fwrite
fclose
_access
strlen
??2@YAPAXI@Z
strcmp
strrchr
memset
sprintf
strcpy
??3@YAXPAX@Z
strcat
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ