DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
006e7c3079b7bbae3fa406896acc1700.dll
Resource
win7-20231215-en
Target
006e7c3079b7bbae3fa406896acc1700
Size
64KB
MD5
006e7c3079b7bbae3fa406896acc1700
SHA1
5c8aff19aa27963844d98691a9289b4e1fd0636b
SHA256
5d39f10f2b6b71543009f19acc56d308d609f46c0068995f74faf8dbf0dd433e
SHA512
6d445530ab99d47cd8446c7833d70c8ed371e95d7febccfee2bc67186fde829cbeaac0e796d91008f7f7aad5820489a916e39f58c1706455a93176138d0b29e5
SSDEEP
1536:r72Y5/aCZ1AYe33mJNRGx+E8ijfPUITIp:mK1A0LG4ijf8IT6
Checks for missing Authenticode signature.
resource |
---|
006e7c3079b7bbae3fa406896acc1700 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetPrivateProfileStringA
FindFirstFileA
ExitProcess
Sleep
GetProcAddress
CreateDirectoryA
LocalFree
WritePrivateProfileStringA
LeaveCriticalSection
EnterCriticalSection
CreateProcessA
RemoveDirectoryA
GetExitCodeProcess
SetFileAttributesA
GetSystemDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
MoveFileA
DeleteFileA
FindNextFileA
CreateThread
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
GetCurrentProcessId
Process32First
Process32Next
CloseHandle
LoadLibraryA
GetCommandLineW
FreeLibrary
WaitForSingleObject
RegCreateKeyExA
RegQueryInfoKeyA
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
_wcslwr
_strupr
_stricmp
_adjust_fdiv
malloc
_initterm
free
fopen
fseek
ftell
fread
fclose
_purecall
strcmp
??2@YAPAXI@Z
atoi
strcpy
??3@YAXPAX@Z
sprintf
memcmp
memcpy
strstr
memset
strrchr
strcat
wcsstr
_strlwr
strncpy
strchr
strncmp
strlen
_access
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ