DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
64391cc5b79a07282ab7954bb34427d7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
64391cc5b79a07282ab7954bb34427d7.dll
Resource
win10v2004-20231222-en
Target
64391cc5b79a07282ab7954bb34427d7
Size
48KB
MD5
64391cc5b79a07282ab7954bb34427d7
SHA1
ee71b01453738a11411a7183f550ef233d97bc47
SHA256
9d762cf6765a41db181829b997949beff1f2c02015b2f988a4201e93b575d265
SHA512
fe4bfbea567ad5833c992ce161d07b35fbb2425cc6c1928bf56579d8e639e3ff8f3da03f7b300da5da7f735c910dc92d44bb43309b9007bb973092eaa656c500
SSDEEP
768:zlUfZemK9tdud2570ejUJidHEM+UZyBXZvfn+i7sOjokrdE91sEOUSnyC:Zqz4ud/xi+3X1f+iDJEDsPR
Checks for missing Authenticode signature.
resource |
---|
64391cc5b79a07282ab7954bb34427d7 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
CloseHandle
LoadLibraryA
GetCommandLineW
GetLocalTime
GetSystemInfo
WritePrivateProfileStringA
GetCurrentProcessId
GetProcAddress
Sleep
CreateThread
WideCharToMultiByte
Process32Next
Process32First
DeleteFileA
GetLastError
GetWindowsDirectoryA
GetSystemDirectoryA
CreateEventA
HeapAlloc
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
PostMessageA
DefWindowProcA
RegisterClassExA
CreateWindowExA
ShowWindow
TranslateMessage
DispatchMessageA
SetWindowTextA
SendMessageA
CallNextHookEx
KillTimer
SetTimer
IsWindow
FindWindowExA
GetMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
fopen
fwrite
_strlwr
fclose
strcmp
strcpy
strstr
free
_initterm
malloc
_adjust_fdiv
_stricmp
strchr
strcat
_access
strrchr
sprintf
rand
strlen
memcmp
memcpy
memset
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ