DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
738878050287575d160c69454a74cf3a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
738878050287575d160c69454a74cf3a.dll
Resource
win10v2004-20231215-en
Target
738878050287575d160c69454a74cf3a
Size
48KB
MD5
738878050287575d160c69454a74cf3a
SHA1
e88d0743f3636ea8db7ded88947ef9ea38f0aa39
SHA256
fc6d2007130a822591c1a46c68ec6cd0054da1b8392dfd0b9a2ca59d37f51292
SHA512
9253087e8cde2b447848a05ba7d53e004bde1677661130046456cac2b7d2e1b7615c305d93c80044369c437413d345b7f22f24bac9de4c589d8c1fc20fdfa203
SSDEEP
768:tGj3rMCQtuIGAXTNQ1iIv5jvHwfZXvmJ5e5HDNhuDu65FdjR62QPBaU82:VtuIlNS9vHmxJ5jzeXFZR6z
Checks for missing Authenticode signature.
resource |
---|
738878050287575d160c69454a74cf3a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
Process32Next
Process32First
Sleep
CreateThread
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrlenA
GetSystemDirectoryA
GetLocalTime
GetLastError
CreateEventA
GetWindowsDirectoryA
LeaveCriticalSection
EnterCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
InterlockedIncrement
GetCurrentProcessId
WritePrivateProfileStringA
DeleteFileA
GetModuleFileNameA
LoadLibraryA
GetCommandLineW
GetProcAddress
FindWindowExA
PostMessageA
IsWindow
KillTimer
SetTimer
SetWindowTextA
SendMessageA
CreateWindowExA
ShowWindow
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
RegisterClassExA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_purecall
strchr
_strlwr
fopen
fwrite
fclose
strcmp
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
strstr
strcpy
strcat
rand
memcpy
sprintf
_access
memset
strrchr
strlen
??2@YAPAXI@Z
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ