DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
047d36e3e6b54b7ea77c60c3d5bf4d50.dll
Resource
win7-20231215-en
Target
047d36e3e6b54b7ea77c60c3d5bf4d50
Size
138KB
MD5
047d36e3e6b54b7ea77c60c3d5bf4d50
SHA1
a821420917134e52b30f1898d803fb3b4c433696
SHA256
2a28e3713401b4a61f67a7d4102ef135193de1d1f5353a53bd043eb6b7b6b2c0
SHA512
d5267faf9e568fff1632be04c88ade6a16e9b4ba8115b9abe715bd34b57d75ee4d4a50e3ac38f9fbc215c88a32229807685dc95d443faff11efd07dc85c17852
SSDEEP
3072:XuTWCXF7mNuNlK+EGlb2HvflEYyfuNMO+az:eTWCXF38+H2nlWoMr
Checks for missing Authenticode signature.
resource |
---|
047d36e3e6b54b7ea77c60c3d5bf4d50 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
FlushInstructionCache
GetCurrentProcess
HeapDestroy
InitializeCriticalSection
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpyW
lstrcatW
DisableThreadLibraryCalls
WaitForMultipleObjects
lstrlenA
MultiByteToWideChar
lstrlenW
CreateThread
SetEvent
WaitForSingleObject
CloseHandle
CreateEventW
GetShortPathNameW
ResetEvent
FormatMessageW
LocalAlloc
LocalFree
GetVersionExW
WideCharToMultiByte
GetComputerNameW
lstrcmpW
lstrcpynW
GetLastError
ReadFile
GetFileSize
CreateFileW
CharNextW
wsprintfW
CoCreateInstance
CoInitialize
CoUninitialize
SysFreeString
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
SysAllocStringLen
VariantInit
SysAllocString
VariantClear
SysStringLen
DispCallFunc
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
HttpOpenRequestW
InternetConnectW
InternetCloseHandle
InternetOpenW
HttpSendRequestW
InternetReadFile
InternetCrackUrlW
StrChrW
StrStrW
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Xlen@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PAD0PBD1@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
_CxxThrowException
memcpy
_purecall
memcmp
printf
atoi
sprintf
strtol
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
strchr
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_except_handler3
?terminate@@YAXXZ
_initterm
malloc
_adjust_fdiv
strlen
time
__CxxFrameHandler
??2@YAPAXI@Z
GetUserNameW
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumValueW
RegCreateKeyExW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ