DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
62265e41212b1a10363fff3ab557ee40N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
62265e41212b1a10363fff3ab557ee40N.dll
Resource
win10v2004-20240709-en
Target
62265e41212b1a10363fff3ab557ee40N.exe
Size
68KB
MD5
62265e41212b1a10363fff3ab557ee40
SHA1
c80215d669efbc62a8bdaa066dfff06f9cd1e7c9
SHA256
42798088a4d6c893c6ff321b8ed266c05b62d2ba880d3d3e0236af466b691ab0
SHA512
9a55398da285c35d28e17ee7942f512a8687bcba53ee9a39e4cfe4c0b3b1ecc9cd618ad9c9b216854d23097b98ac28c75fc3284f6ffef4b755ca4c7dcf972367
SSDEEP
768:3yBYUL0YED7ru7Iw8tL0T2JAfRLnHr/wlmVMPSXBABzt9a3DP0t0XGt:JecW7IfZ0T/BLolFaBmtI3r0t0XGt
Checks for missing Authenticode signature.
resource |
---|
62265e41212b1a10363fff3ab557ee40N.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UuidToStringA
RpcStringFreeA
ord1176
ord1197
ord1570
ord1253
ord1255
ord6467
ord1578
ord600
ord826
ord269
ord825
ord823
ord800
ord2915
ord342
ord1182
ord6877
ord860
ord540
ord2044
ord2107
ord3903
ord1601
ord2448
ord2841
ord3663
ord5450
ord5834
ord6394
ord858
ord1577
ord1168
ord1575
ord1243
ord6383
ord1116
ord5440
_CxxThrowException
wcslen
_strcmpi
_strupr
??1type_info@@UAE@XZ
memcpy
strcpy
strcat
__CxxFrameHandler
atoi
memset
_mbscmp
strlen
_purecall
memcmp
rand
srand
memmove
strchr
strstr
malloc
_adjust_fdiv
wcsstr
wcscpy
free
fclose
fwrite
fopen
_except_handler3
_initterm
_onexit
__dllonexit
_EH_prolog
strtok
time
LeaveCriticalSection
LocalAlloc
LocalFree
ExitProcess
FreeLibrary
WinExec
ReadFile
lstrcpynA
GetWindowsDirectoryA
GetTempPathA
GetTempFileNameA
lstrcmpW
Sleep
WideCharToMultiByte
OpenMutexA
CreateMutexA
GetModuleHandleA
CreateThread
EnterCriticalSection
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
DisableThreadLibraryCalls
MultiByteToWideChar
FindResourceA
LoadResource
SizeofResource
GetModuleFileNameA
lstrcatA
GetSystemDirectoryA
WriteFile
GetLastError
VirtualLock
GetLocaleInfoA
GetProcAddress
LoadLibraryA
lstrcpyA
lstrlenA
lstrcmpiA
GetVersionExA
DeleteFileA
CloseHandle
GetFileSize
CreateFileA
GetTickCount
FindWindowExA
SendMessageA
PostThreadMessageA
wsprintfW
CallWindowProcA
LoadImageA
GetMessageA
wsprintfA
MessageBoxA
SetWindowLongA
RegQueryInfoKeyA
RegOpenKeyExA
CloseServiceHandle
OpenServiceA
CreateServiceA
OpenSCManagerA
RegSetValueExA
RegDeleteValueA
RegSetValueA
RegCloseKey
RegEnumValueA
RegCreateKeyExA
RegQueryValueExA
ShellExecuteA
ord16
ord15
ord32
ord31
ord23
VariantInit
VariantCopy
SysAllocString
VariantCopyInd
SysFreeString
VariantClear
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ