DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
210448eda0afac985ca6dbc9b2467288.dll
Resource
win7-20231215-en
Target
210448eda0afac985ca6dbc9b2467288
Size
52KB
MD5
210448eda0afac985ca6dbc9b2467288
SHA1
7f222b348bda72f9019b0b09c6d77294076df38b
SHA256
9d8eadf13cd7fc5134a34b10fdea00b32abb66161038a99f5a166aaf8fc8e539
SHA512
3978a807da7177072e9397007f058aedbca4f71e83aaecbe1710c20a22c089aba77f27d4c009db8cd6ce4944b27c34589d4257a2be13d33eec1266e06c86592e
SSDEEP
768:I0DwjVuDp1Loi33Ec5joSU20v7yzLZMAmOzIsDZ81R1r4ehiiwcYs/VIlLL:I08h03Ec5joZ3vOzLMc634wScYjl
Checks for missing Authenticode signature.
resource |
---|
210448eda0afac985ca6dbc9b2467288 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
EnterCriticalSection
CloseHandle
Process32Next
Process32First
LocalFree
FreeLibrary
CreateThread
MoveFileA
SetFileAttributesA
GetCurrentProcessId
Sleep
GetCommandLineW
FindFirstFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateDirectoryA
WritePrivateProfileStringA
GetPrivateProfileStringA
DeleteFileA
FindNextFileA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
LoadLibraryA
GetModuleFileNameA
GetProcAddress
ExitProcess
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
sprintf
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
_access
??2@YAPAXI@Z
_purecall
strncmp
strncpy
strcat
strcpy
strcmp
strrchr
??3@YAXPAX@Z
memcmp
memcpy
memset
strlen
_stricmp
atoi
strchr
strstr
SHSetValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ