CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
d6481cbcb18df0c5634ba09b77b4a024.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d6481cbcb18df0c5634ba09b77b4a024.dll
Resource
win10v2004-20240226-en
Target
d6481cbcb18df0c5634ba09b77b4a024
Size
108KB
MD5
d6481cbcb18df0c5634ba09b77b4a024
SHA1
454299c33cdddfcee53a1c7730a01b87ffd0ac3e
SHA256
eac971eb7aee5fa5813a269bd2a4c58d67d3cfee4d13c04314aee520addc746c
SHA512
0a4dc4853575764f567b2cc20c00acac44b284013249d68cda3e1da2512a3c2868ea4cf40162efcdb257c3d0797b0ce65c2f25d30078bc6b2f6e12dd6f004756
SSDEEP
3072:jCwz+tnHYZ0sA9Sn08oHFJgDBfGOePgYd:2w6S0sKS08oHFJGGOePfd
Checks for missing Authenticode signature.
resource |
---|
d6481cbcb18df0c5634ba09b77b4a024 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
srand
time
_vsnprintf
tolower
strrchr
_except_handler3
memcpy
rand
malloc
free
exit
strncpy
wcsstr
wcscpy
wcsncat
strstr
wcslen
mbstowcs
fopen
fseek
ftell
fclose
??2@YAPAXI@Z
wcscmp
??3@YAXPAX@Z
strlen
sprintf
memset
_strcmpi
_strupr
lstrlenA
MultiByteToWideChar
GetModuleHandleA
GetProcessHeap
HeapAlloc
SetFilePointer
CreateToolhelp32Snapshot
Module32First
Module32Next
CloseHandle
GetTempPathA
DeleteFileA
GetFileSize
ReadFile
WideCharToMultiByte
GetFileAttributesW
GetPrivateProfileStringA
Sleep
LoadLibraryA
FreeLibrary
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
GetDC
GetWindowRect
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE