DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
073a38979bf6fbce2defa128506da691.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
073a38979bf6fbce2defa128506da691.dll
Resource
win10v2004-20231215-en
Target
073a38979bf6fbce2defa128506da691
Size
48KB
MD5
073a38979bf6fbce2defa128506da691
SHA1
c4e1361fa6d4913a66f93b40715304e84992a031
SHA256
c97ba6c3883331b3aac81d0676d4fa7e20060c06310a1a4460f5230dbfad4a6f
SHA512
b6330b0c7a54381ddad0308fd9931fd75bdb25131ff853f913feefe8b1a9b55b4cbf5744d720d77db665d691d2c5de87b13c2fda5a522c864d553a1f431b91f0
SSDEEP
768:eaH5X6+CTpkavF+O0wtGmVc0xNgLa1wv:eaHl6+C2qPvk50MLaCv
Checks for missing Authenticode signature.
resource |
---|
073a38979bf6fbce2defa128506da691 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
GetLastError
CreateMutexA
CreateProcessA
GetSystemDirectoryA
VirtualAlloc
InterlockedIncrement
WinExec
GetWindowsDirectoryA
GetModuleFileNameA
LoadLibraryA
CreateThread
CloseHandle
GetLocalTime
ShowWindow
CreateWindowExA
SetWindowsHookExA
DefWindowProcA
PostMessageA
FindWindowExA
CallNextHookEx
KillTimer
SetTimer
UnhookWindowsHookEx
GetMessageA
TranslateMessage
DispatchMessageA
RegisterClassExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetValueA
sprintf
_adjust_fdiv
malloc
_initterm
free
strchr
fopen
fwrite
fclose
strrchr
__CxxFrameHandler
_stricmp
_except_handler3
??2@YAPAXI@Z
_pctype
??3@YAXPAX@Z
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ