DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c5f3ae25d431393b4ba75e83938ae242.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5f3ae25d431393b4ba75e83938ae242.dll
Resource
win10v2004-20240226-en
Target
c5f3ae25d431393b4ba75e83938ae242
Size
44KB
MD5
c5f3ae25d431393b4ba75e83938ae242
SHA1
658212fb123242512f262c8a619f112124f9225b
SHA256
b731504c6fb2b30e0e346ca91f254966cb167aaf6396185adb8ee2b682449e4d
SHA512
905dded7434b9281830cc436e19955788f63a9fcc486ba1d712f7fdc1277254064096abf651b46b03853758f929e2b5a42433c23a246e2b16dc1cddbf65b237b
SSDEEP
768:UGJ/FeH4pkavccThViwF7Dscl+SEWFwYFKxHTYgLa1:U3rZoVFnNPfwYgJtLa
Checks for missing Authenticode signature.
resource |
---|
c5f3ae25d431393b4ba75e83938ae242 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetLocalTime
GetLastError
VirtualAlloc
CreateProcessA
InterlockedIncrement
CreateThread
CloseHandle
GetSystemDirectoryA
GetWindowsDirectoryA
WinExec
CreateMutexA
DefWindowProcA
SetTimer
KillTimer
PostMessageA
CreateWindowExA
CallNextHookEx
SetWindowsHookExA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterClassExA
UnhookWindowsHookEx
ShowWindow
FindWindowExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
??2@YAPAXI@Z
_adjust_fdiv
malloc
_initterm
free
strrchr
atoi
__CxxFrameHandler
_except_handler3
_stricmp
??3@YAXPAX@Z
strchr
fclose
fwrite
fopen
sprintf
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
SHGetValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ