DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7260e025309cbc2669d0b40c2de9ba69.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7260e025309cbc2669d0b40c2de9ba69.dll
Resource
win10v2004-20231222-en
Target
7260e025309cbc2669d0b40c2de9ba69
Size
48KB
MD5
7260e025309cbc2669d0b40c2de9ba69
SHA1
087f27db5a02578bbd9c3bdfb0421f118184fcd8
SHA256
ece6462bf9ab22b7299f4e8a067b3812855e5bc1aec2acc823b563938e0e3be0
SHA512
5bba0d056fbe5f9c006e5c991361c03250bb6cc6400f25f284c8cedd0a92fb431c6766a6326fef89a57d850e142470720d7c674d22b19d9ae659b8363249b19a
SSDEEP
768:lE8jZA+aBfGJ8Sq58C2wayEp4otEbBsE/ee09eg5ZcxWkabqyYuVOJ3L:2e5DSN58C2wayA4otENsyee0RZMNabmp
Checks for missing Authenticode signature.
resource |
---|
7260e025309cbc2669d0b40c2de9ba69 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetCommandLineW
WritePrivateProfileStringA
GetWindowsDirectoryA
GetSystemDirectoryA
CloseHandle
GetSystemInfo
GetLastError
GetLocalTime
DeleteFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
Sleep
CreateThread
WideCharToMultiByte
CreateEventA
HeapAlloc
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
IsWindow
FindWindowExA
RegisterClassExA
SetWindowTextA
SendMessageA
CallNextHookEx
TranslateMessage
DispatchMessageA
KillTimer
SetTimer
PostMessageA
DefWindowProcA
CreateWindowExA
ShowWindow
GetMessageA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strrchr
_strlwr
rand
strcmp
strchr
fopen
fwrite
free
_initterm
malloc
_adjust_fdiv
_stricmp
strstr
fclose
_access
strcat
strcpy
sprintf
strlen
memcmp
memcpy
memset
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ