DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0a3d868531e5580c6dbe32de73f2c390.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a3d868531e5580c6dbe32de73f2c390.dll
Resource
win10v2004-20231215-en
Target
0a3d868531e5580c6dbe32de73f2c390
Size
80KB
MD5
0a3d868531e5580c6dbe32de73f2c390
SHA1
3d90075369973402aa43afa4252f6ed1e501897c
SHA256
841546fd3ec1146978189a2723612393a68705d30e11bee1df4f2efa70da4b73
SHA512
eaa864828dcd30c292a665ef312dc6a2b40c68c32f00d8644f3464bc93c19819484fda5daa3f54ceb201c4b9892012df8297dae044ce87862e1a7d9138c314fe
SSDEEP
768:xIUk/R0MFl9HO+GI2hXgJZDgUmJfQBNv4/ZbGEx70/qZByg/fk6gbkf01b:Dk/OMtuFhQJ93Qko4dyZJ/xg3
Checks for missing Authenticode signature.
resource |
---|
0a3d868531e5580c6dbe32de73f2c390 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
lstrlenW
GetModuleFileNameA
CreateDirectoryA
Sleep
GetCommandLineW
GetCurrentProcessId
CreateThread
ExitProcess
CreateProcessA
RemoveDirectoryA
GetExitCodeProcess
WaitForSingleObject
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
WritePrivateProfileStringA
MoveFileA
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
MultiByteToWideChar
SetFileAttributesA
LocalFree
Process32First
Process32Next
CloseHandle
EnterCriticalSection
LeaveCriticalSection
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
DeleteFileA
GetSystemDirectoryA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
fclose
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
memcpy
atoi
strncmp
strchr
strncpy
_wcslwr
wcsstr
strlen
strstr
strrchr
sprintf
??3@YAXPAX@Z
strcpy
memcmp
??2@YAPAXI@Z
_access
strcat
strcmp
_strupr
fread
memset
ftell
fseek
fopen
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ