Remove
Setup
_DllMain@12
Static task
static1
Behavioral task
behavioral1
Sample
813e3aa3b8d9a4a3b5b1d3ebb78c80da.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
813e3aa3b8d9a4a3b5b1d3ebb78c80da.dll
Resource
win10v2004-20231215-en
Target
813e3aa3b8d9a4a3b5b1d3ebb78c80da
Size
88KB
MD5
813e3aa3b8d9a4a3b5b1d3ebb78c80da
SHA1
05a76bf3a3033a7a494612ee262c176ce25f9f15
SHA256
4ad68db6003de3361234a2adbc20498582619283d4c00d2af57fe932599bd2f0
SHA512
b3601f4af456d08d3844cf53eb9de70324d6f2e01d417fc37249c3543e58c03bcd8dfa359bb3a7e09d24746fd3859f4623cafafa1e6238a5693a0eee5d03e54c
SSDEEP
768:pXICL/uKJMb4H3N0CmzIxMc0n61600xuqx8E:pXIC7dGbA3C0NMxlxL
Checks for missing Authenticode signature.
resource |
---|
813e3aa3b8d9a4a3b5b1d3ebb78c80da |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteFileA
Sleep
CopyFileA
GetSystemDirectoryA
lstrlenA
CreateFileA
GetLastError
DeviceIoControl
HeapDestroy
GetCurrentProcess
GetCurrentThreadId
HeapAlloc
SetFileAttributesA
GetFileAttributesA
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
CloseHandle
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
HeapFree
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
GetModuleFileNameA
FreeEnvironmentStringsA
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
WideCharToMultiByte
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetStdHandle
LoadLibraryA
FlushFileBuffers
SetFilePointer
wsprintfA
RegOpenKeyExA
OpenServiceA
RegEnumKeyExA
StartServiceA
OpenSCManagerA
QueryServiceStatus
DeleteService
CloseServiceHandle
CreateServiceA
GetSecurityDescriptorDacl
ControlService
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
GetAclInformation
QueryServiceObjectSecurity
SetServiceObjectSecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetAce
Remove
Setup
_DllMain@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE