DllCanUnloadNow
DllGetClassObject
DllRegisterServer
InjectDll
UnmapDll
Static task
static1
Behavioral task
behavioral1
Sample
9754211077729e8c48b999cd82f0964f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9754211077729e8c48b999cd82f0964f.dll
Resource
win10v2004-20231215-en
Target
9754211077729e8c48b999cd82f0964f
Size
76KB
MD5
9754211077729e8c48b999cd82f0964f
SHA1
f1b902fec265c2507e2408fe894a75efa2e62250
SHA256
2329e70401a1b789dd52c97ec331594189c5ccf49e7ec5e1b3662541b62ad519
SHA512
a34c6a54869a28558ccaa042db34a69e36ba354d22fc4750bd700ac136688a470f1043d83ca87339202480df0c8995b08bac21acae160d393f24c786db9a8332
SSDEEP
1536:AEoOD/2MTag4WKdX2fSXJadeiWHcoZIxJ4Tsx9BfOkg:AE1aTX9iWHcoiGTs9fOkg
Checks for missing Authenticode signature.
resource |
---|
9754211077729e8c48b999cd82f0964f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord561
ord825
ord815
ord1168
ord1134
ord5500
ord1132
ord6467
ord1131
ord6354
ord2818
ord535
ord2064
ord1105
ord858
ord540
ord1175
ord801
ord6143
ord541
ord6883
ord3181
ord4058
ord2781
ord668
ord2770
ord924
ord356
ord860
ord5860
ord823
ord6142
ord6215
ord2086
ord2864
ord2393
ord6385
ord5207
ord690
ord665
ord1979
ord5186
ord354
ord389
ord4278
ord2764
ord3337
ord3811
ord6597
ord6800
ord6650
ord6591
ord6807
ord6857
ord6823
ord6855
ord6832
ord6859
ord6867
ord6847
ord6814
ord6839
ord6846
ord6858
ord6815
ord6812
ord6845
ord6856
ord6835
ord4589
ord4588
ord4899
ord4370
ord4892
ord6817
ord5076
ord4340
ord4347
ord4720
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord4078
ord1776
ord4407
ord2385
ord5163
ord6374
ord4353
ord5281
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3748
ord5065
ord1725
ord5260
ord2446
ord6614
ord5277
ord3738
ord4627
ord4432
ord6478
ord6514
ord6055
ord5241
ord5290
ord3749
ord1727
ord5261
ord2124
ord3402
ord3721
ord6880
ord795
ord6241
ord567
ord6453
ord2379
ord2614
ord5572
ord2915
ord922
ord538
ord939
ord3571
ord3619
ord5265
ord4376
ord4853
ord4998
ord2514
ord6052
ord1775
ord5280
ord4425
ord3597
ord641
ord2243
ord1641
ord1146
ord324
ord3663
ord3626
ord2414
ord2302
ord4234
ord755
ord640
ord2405
ord6172
ord5875
ord5789
ord5785
ord3920
ord2567
ord4133
ord4297
ord5788
ord472
ord1640
ord323
ord470
ord3706
ord6805
ord3092
ord4299
ord6199
ord4710
ord5356
ord4277
ord6877
ord5807
ord6058
ord5424
ord5204
ord3229
ord6928
ord6930
ord2575
ord4396
ord3574
ord3573
ord3693
ord609
ord4275
ord4284
ord2860
ord5787
ord2859
ord1176
ord1575
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord772
ord500
ord800
ord6691
ord537
ord1116
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
__CxxFrameHandler
sprintf
_mbsicmp
atoi
_mbscmp
fclose
fprintf
fopen
_mbsnbicmp
fread
ftell
fseek
strerror
_errno
_mbccpy
_mbclen
_mbschr
_mbsnbcmp
wctomb
strtol
_mbsncmp
_mbsnicmp
free
malloc
_EH_prolog
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
LocalAlloc
LocalFree
GetSystemDirectoryA
lstrlenA
DisableThreadLibraryCalls
FreeLibrary
LoadLibraryA
GetModuleFileNameA
CopyFileA
DeleteFileA
MultiByteToWideChar
SetFileAttributesA
GetVersionExA
RemoveDirectoryA
GetWindowsDirectoryA
GetLocalTime
CreateProcessA
MulDiv
GetWindowTextA
InflateRect
DrawStateA
InvalidateRect
GetParent
GetCursorPos
ScreenToClient
LoadCursorA
SetCursor
CopyRect
PostMessageA
GetSystemMetrics
FindWindowA
OffsetRect
FillRect
SetRect
SetWindowRgn
GetClientRect
RegisterWindowMessageA
SendMessageA
SetWindowsHookExA
PtInRect
LoadBitmapA
EnableWindow
GetWindowRect
KillTimer
UnhookWindowsHookEx
SetWindowLongA
MessageBeep
CallNextHookEx
SetTimer
CallWindowProcA
GetWindowThreadProcessId
DrawFocusRect
StretchBlt
RoundRect
GetTextExtentPoint32A
CreatePen
CreateSolidBrush
CreateDIBitmap
CreateRoundRectRgn
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
GetObjectA
CreateFontA
RegQueryValueA
RegCloseKey
SHGetSpecialFolderPathA
_TrackMouseEvent
CoCreateInstance
CoInitialize
PathFileExistsA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
InjectDll
UnmapDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ