DllRegisterServer
DllUnregisterServer
MXAttention
MXStartDaemon
MXStopDaemon
MXSysMenu
ReloadPath
Static task
static1
Behavioral task
behavioral1
Sample
259095521a8b5ba1a333623c4e1c0e272e570b33a83abe9803f73d7f210681a4.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
259095521a8b5ba1a333623c4e1c0e272e570b33a83abe9803f73d7f210681a4.dll
Resource
win10v2004-20240508-en
Target
259095521a8b5ba1a333623c4e1c0e272e570b33a83abe9803f73d7f210681a4
Size
52KB
MD5
2d0d4b5a5dace167d85253053f2e8524
SHA1
5569d46d76f48c28042fcde60b1e2d426022b5f0
SHA256
259095521a8b5ba1a333623c4e1c0e272e570b33a83abe9803f73d7f210681a4
SHA512
869f1585db2b0d1a37e941cb59216f046c5ccf94c167adc6c0d314ba0f69f76f18902187c2e4302d7ae41610f59b6a0e5467bdc54936d766c0799651f24768b4
SSDEEP
768:o5LP7FvRF+dNz1bnJV8VTJLqBEkZ8n5hllAr:o5X5+rBzJV8VTJMd8n5hly
Checks for missing Authenticode signature.
resource |
---|
259095521a8b5ba1a333623c4e1c0e272e570b33a83abe9803f73d7f210681a4 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
?_Xran@std@@YAXXZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?at@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?resize@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?_Xlen@std@@YAXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
CallNextHookEx
GetClassNameA
GetWindowLongA
EnumChildWindows
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
LoadStringA
GetWindowTextA
_onexit
__dllonexit
_adjust_fdiv
_initterm
_vsnprintf
_strdup
free
_mbslwr
memmove
__CxxFrameHandler
??2@YAPAXI@Z
malloc
_mbsstr
sprintf
_mbsrchr
_stricmp
GetUserDefaultLangID
SetEvent
GetVersionExA
lstrcmpA
WriteFile
CreateFileMappingA
MapViewOfFile
CreateFileA
OpenFileMappingA
CloseHandle
SetFilePointer
UnmapViewOfFile
GetDateFormatA
GetLocalTime
GetTimeFormatA
GetLastError
lstrcmpiA
SizeofResource
GetModuleHandleA
FreeLibrary
VirtualQuery
GetVersion
lstrcpynA
lstrcpyA
CreateMutexA
ReleaseMutex
lstrlenA
lstrcatA
GetModuleFileNameA
FindResourceA
CreateEventA
WaitForSingleObject
SetUnhandledExceptionFilter
GetShortPathNameA
LoadLibraryA
GetProcAddress
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DllRegisterServer
DllUnregisterServer
MXAttention
MXStartDaemon
MXStopDaemon
MXSysMenu
ReloadPath
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ