DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0bc1ee36b1475a0cc00eb6e14e4ed90b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0bc1ee36b1475a0cc00eb6e14e4ed90b.dll
Resource
win10v2004-20231215-en
Target
0bc1ee36b1475a0cc00eb6e14e4ed90b
Size
64KB
MD5
0bc1ee36b1475a0cc00eb6e14e4ed90b
SHA1
2ec241bb4c8e353a8e69682d769b484959cd507e
SHA256
8f722269eafe4301e14e96eb123198325febebefaf8c2c9937e5e11edf09fea0
SHA512
c7d39e339f1b5c1dd0f68425f7d82c2df7ef48ba81f6db7daa6a8ce5cd3d549f73bdac88581d356b37ff7a85deeab2e7dd9d58ca1e77573e308973f3baf31c5a
SSDEEP
1536:a7rXos+RJbPaTCgCJlVKDgASeTpLdlngDMPBn6Bw7S0D:anYZR5Pa61IjlQMPBny0
Checks for missing Authenticode signature.
resource |
---|
0bc1ee36b1475a0cc00eb6e14e4ed90b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Netbios
lstrcpyA
DisableThreadLibraryCalls
GetModuleFileNameA
InterlockedIncrement
InterlockedDecrement
lstrcpynA
lstrcatA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
CreateFileA
CloseHandle
ReadFile
GetFileSize
GetTickCount
WriteFile
SetFilePointer
GetSystemDirectoryA
Sleep
GetCurrentProcessId
OutputDebugStringA
GetProcAddress
LoadLibraryA
VirtualProtect
ResetEvent
WaitForSingleObject
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
DuplicateHandle
OpenProcess
DeleteFileA
SetFileAttributesA
GetLocalTime
CreateThread
lstrcmpA
CreateEventA
SetEvent
OpenEventA
GetCommandLineW
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
ExitProcess
lstrlenA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetTempPathA
GetCurrentProcess
wvsprintfA
SetWindowTextA
CharNextA
wsprintfA
MessageBoxA
FindWindowA
EnumWindows
GetWindowThreadProcessId
EnumChildWindows
SetForegroundWindow
GetClassNameA
FindWindowExA
GetWindowLongA
SetWindowLongA
SendMessageA
GetWindowTextA
CallWindowProcA
GetClientRect
RegEnumValueA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegDeleteKeyA
CommandLineToArgvW
ShellExecuteA
CoTaskMemRealloc
CoCreateInstance
StringFromGUID2
CoTaskMemFree
CoTaskMemAlloc
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
SysStringLen
LoadTypeLi
SysAllocString
SysFreeString
SHDeleteKeyA
wnsprintfA
SHSetValueA
PathFindExtensionA
realloc
??_U@YAPAXI@Z
??2@YAPAXI@Z
strchr
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_initterm
free
_adjust_fdiv
__CppXcptFilter
__security_error_handler
_strlwr
malloc
wcsncpy
__CxxFrameHandler
strstr
strrchr
_purecall
??_V@YAXPAX@Z
??3@YAXPAX@Z
_CxxThrowException
_except_handler3
_resetstkoflw
memcmp
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ