DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0b5b49721e3abfad5ab47112445aedd4.dll
Resource
win7-20231215-en
Target
0b5b49721e3abfad5ab47112445aedd4
Size
72KB
MD5
0b5b49721e3abfad5ab47112445aedd4
SHA1
6105ea2b296b35ba1664b832359a26e975dc7f85
SHA256
30f88a16d1a423ee1d97aebe66878b935f0f9b3c76d3319249a471fa91cb32f1
SHA512
214ec0f996f383a50f9aadec0b62e70f19160313929592ac788bee53b50f1ce6e952ab3e1a205c11787d6327d9b880c013b4a2a12221219da4180004c89e0853
SSDEEP
1536:zb3Dc0y7JdGLpKnT+Xezu5tdejSRQv4TlJxIxbILKU:zJy7vyOWjtAOz3wb8K
Checks for missing Authenticode signature.
resource |
---|
0b5b49721e3abfad5ab47112445aedd4 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
LocalFree
SetFileAttributesA
CreateDirectoryA
WritePrivateProfileStringA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
WideCharToMultiByte
GetModuleHandleA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
Process32Next
Process32First
GetCurrentProcessId
GetCommandLineW
ExitProcess
MoveFileA
lstrlenA
MultiByteToWideChar
FreeLibrary
CreateThread
DeleteFileA
RemoveDirectoryA
Sleep
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
GetProcAddress
LoadLibraryA
GetShortPathNameA
RegDeleteKeyA
RegQueryValueExA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoCreateInstance
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
CoMarshalInterThreadInterfaceInStream
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
memcmp
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
atoi
fopen
fseek
ftell
fread
fclose
_purecall
??3@YAXPAX@Z
memset
sprintf
strncpy
strchr
strncmp
strlen
strcpy
strcat
_access
_stricmp
strcmp
strrchr
strstr
??2@YAPAXI@Z
memcpy
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ