DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
792827a3d4f97e2a92212e4756a8a63e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
792827a3d4f97e2a92212e4756a8a63e.dll
Resource
win10v2004-20231222-en
Target
792827a3d4f97e2a92212e4756a8a63e
Size
72KB
MD5
792827a3d4f97e2a92212e4756a8a63e
SHA1
d22fdc24b4af1b4fecdd656765b8b49222edcb2c
SHA256
c18d918dbc8f3b80d0162068044a28eda87b80e0590e12f0809cd848c9a7be53
SHA512
8123c5e6bd6dd8cd50e7ccfb347f549fe8fe51b371a18a0dacdb57c391248ae437ef6e7a6ab9eb74d049ac6b342587e399e6379b2547155e8c5e1f1a941b4de8
SSDEEP
1536:QCowE3EHw+HZCTvsStCfbPQNPN6/NEEk8aqG:3ZCTUSt+PQNPN6/NEE1ZG
Checks for missing Authenticode signature.
resource |
---|
792827a3d4f97e2a92212e4756a8a63e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetLastError
CreateFileMappingA
CloseHandle
lstrlenA
MapViewOfFile
LocalAlloc
LocalFree
GetCurrentThreadId
GetCurrentProcessId
GetLocalTime
UnmapViewOfFile
FindWindowExA
CallWindowProcW
SetWindowLongA
SendMessageA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
ProgIDFromCLSID
CoTaskMemFree
CoInitialize
SysFreeString
ord4079
ord5500
ord3953
ord815
ord1577
ord1116
ord1176
ord1575
ord561
ord825
ord823
ord1799
ord2982
ord3147
ord3259
ord4465
ord3136
ord2985
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4424
ord614
ord1206
ord2623
ord290
ord1223
ord4622
ord4226
ord2486
ord4003
ord446
ord743
ord2727
ord6467
ord2730
ord2729
ord3262
ord1200
ord1113
ord3237
ord800
ord539
ord537
ord536
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord1182
ord4698
ord5307
ord5289
ord5714
ord3081
ord3738
ord1255
ord1570
ord342
ord1253
ord1132
ord1131
ord1216
ord1569
ord1196
ord1168
ord6440
ord4167
ord521
ord6307
ord413
ord711
ord860
ord858
ord922
ord4277
ord535
ord941
ord939
ord2818
ord540
ord1578
ord600
ord826
ord269
ord1197
ord1243
__CxxFrameHandler
__dllonexit
malloc
??1type_info@@UAE@XZ
_adjust_fdiv
_onexit
_initterm
free
_mbscmp
strrchr
strcat
memcpy
strlen
_mbslwr
_mbsstr
_itoa
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1_Lockit@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
?open@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXPBDH@Z
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
??0?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?close@?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??0_Lockit@std@@QAE@XZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ