NP_GetEntryPoints
NP_GetMIMEDescription
NP_Initialize
NP_Shutdown
Static task
static1
Behavioral task
behavioral1
Sample
15c55b74f05b6a1eba3eca80c5127e24.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15c55b74f05b6a1eba3eca80c5127e24.dll
Resource
win10v2004-20231215-en
Target
15c55b74f05b6a1eba3eca80c5127e24
Size
101KB
MD5
15c55b74f05b6a1eba3eca80c5127e24
SHA1
48a3d80d761279449bb321d07c572cd7985a4fce
SHA256
21c5b50986eec1cd9b0a8b2f951e00881cc018cc1a23bd8f1c38786838fde6df
SHA512
5ecb1e4a01d4a2b383a82e32e039c33157d040ca27d22c4ffaf5566b25db034494b4d2c61f06fbfe1da78502a7390ef73324fc0c4efbf3144ec7c8ddb13e5a43
SSDEEP
1536:lZGBojjXduXbTwV89NhmoiKSHyC3Kq7zc85tFMCaoJ:lfzGS3B7I85tFM9G
Checks for missing Authenticode signature.
resource |
---|
15c55b74f05b6a1eba3eca80c5127e24 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFileExistsA
InternetCrackUrlA
GetProcessHeap
GetVolumeInformationA
GetLastError
GetTickCount
GetCurrentProcessId
CreateFileA
WaitForSingleObject
WriteFile
TerminateThread
Sleep
CreateProcessA
ReleaseMutex
HeapFree
GetTempPathA
CreateThread
GetModuleHandleA
GetCurrentProcess
LocalFree
FlushFileBuffers
InterlockedDecrement
InterlockedIncrement
HeapAlloc
GetComputerNameA
GetProcAddress
lstrcpynA
LoadLibraryA
FreeLibrary
lstrcmpiA
lstrlenA
GetLocaleInfoA
CloseHandle
WriteConsoleA
WriteConsoleW
GetConsoleOutputCP
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
SetFilePointer
DuplicateTokenEx
ConvertStringSidToSidW
SetTokenInformation
OpenProcessToken
CreateProcessAsUserA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
GetLengthSid
VariantClear
NP_GetEntryPoints
NP_GetMIMEDescription
NP_Initialize
NP_Shutdown
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ