CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
a2e8270553869b506e773e2e32712863.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2e8270553869b506e773e2e32712863.dll
Resource
win10v2004-20240221-en
Target
a2e8270553869b506e773e2e32712863
Size
105KB
MD5
a2e8270553869b506e773e2e32712863
SHA1
c43b39212506150d5141ffa6ec9fcc15ea1ef98a
SHA256
9f64d16d38b3596e0eb77e5f3c3615505c8126d9b38bd296a1450eca595b130c
SHA512
0c839b98acef0366ac46bdce7217a976ed16cb6e177aac28e854e527472c5d8d6a4e9cc7967d974e7754d59363e882cf9bcc00ed22a2e95f0a0483ff1bc259c3
SSDEEP
1536:Eh1T6DE3TEYkJUpltHfuPu2Oedv+/oE2B4ImHiud7mmh+c:EfEYkJkfuhZIobB4ImHFZ+c
Checks for missing Authenticode signature.
resource |
---|
a2e8270553869b506e773e2e32712863 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
??2@YAPAXI@Z
wcscmp
fclose
strcpy
sprintf
memset
ftell
fseek
_vsnprintf
tolower
_except_handler3
memcpy
malloc
exit
strrchr
wcsstr
wcscpy
wcsncat
strstr
time
srand
rand
strcat
wcslen
strcmp
strncpy
free
_stricmp
strlen
mbstowcs
??3@YAXPAX@Z
fopen
_strupr
_strcmpi
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
DeleteDC
MultiByteToWideChar
GetModuleHandleA
GetProcessHeap
HeapAlloc
SetFilePointer
CloseHandle
GetFileSize
ReadFile
WideCharToMultiByte
GetFileAttributesW
GetTempPathA
DeleteFileA
GetModuleFileNameA
GetPrivateProfileStringA
Sleep
OpenProcess
TerminateProcess
GetCurrentProcess
LoadLibraryA
FreeLibrary
lstrlenA
wsprintfA
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetDC
GetWindowRect
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE