DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7a4136e759935c39580ef68d1e43759e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a4136e759935c39580ef68d1e43759e.dll
Resource
win10v2004-20231215-en
Target
7a4136e759935c39580ef68d1e43759e
Size
48KB
MD5
7a4136e759935c39580ef68d1e43759e
SHA1
5e0b76e87e2d9f13bedb4d1f256218b39c1bd139
SHA256
40b64b709e4568b257fcc5df57a3e6385f9c650fa9d22981e19a15eec376cb1a
SHA512
61dbf2a1099c593ff6d27256c5278c8a8f4fd7db312e62335979816681ba121c2aa30cf60b3aa054b1ba60daf97c63a95a4f348acd28be3d7a9857f364807a84
SSDEEP
768:5JqFgOvH6CISzuKvcLXs8AGPoIfNfvI0mOYbZVou9y2JuUQ37ty8G:5gCSTcL8uPoIVfvT/60ZdU8
Checks for missing Authenticode signature.
resource |
---|
7a4136e759935c39580ef68d1e43759e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InterlockedIncrement
GetLocalTime
Sleep
CreateThread
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrlenA
GetCommandLineW
GetLastError
CreateEventA
GetCurrentProcessId
GetModuleFileNameA
GetSystemDirectoryA
GetWindowsDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
LoadLibraryA
GetProcAddress
WritePrivateProfileStringA
EnterCriticalSection
LeaveCriticalSection
Process32First
Process32Next
DeleteFileA
CloseHandle
PostMessageA
DefWindowProcA
CreateWindowExA
ShowWindow
IsWindow
TranslateMessage
DispatchMessageA
SetWindowTextA
SendMessageA
RegisterClassExA
CallNextHookEx
KillTimer
SetTimer
FindWindowExA
GetMessageA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
CommandLineToArgvW
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_purecall
rand
_strlwr
memcpy
strchr
fopen
fwrite
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
fclose
??2@YAPAXI@Z
strlen
strstr
strcmp
strrchr
memset
sprintf
strcat
_access
strcpy
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ