DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4d2733f8a7c54c5b6e700e5b16643692.dll
Resource
win7-20231129-en
Target
4d2733f8a7c54c5b6e700e5b16643692
Size
64KB
MD5
4d2733f8a7c54c5b6e700e5b16643692
SHA1
47cfedc6db6471f9f7fcff081b53d66f26df68c5
SHA256
db8f73f96c988e4c5759e4a2b7eb4908ef5b7ab45e05d2b048383e545b93f7cf
SHA512
0e987d3923fd3ae64fbb81295d77a45e956841cf85158b2c25b205e07e01a6355cb8aac815e8443a738c3c120c8d34963989e53bc93b4ec57e22d1483f6f8851
SSDEEP
1536:aN1+fnKdcy+PmsUonjtLUrCfaFisJIQ0BM:01pP+7U0RAyBM
Checks for missing Authenticode signature.
resource |
---|
4d2733f8a7c54c5b6e700e5b16643692 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
Sleep
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
WritePrivateProfileStringA
LocalFree
ExitProcess
WideCharToMultiByte
RemoveDirectoryA
DeleteFileA
GetProcAddress
FreeLibrary
FindNextFileA
SetFileAttributesA
GetPrivateProfileStringA
FindFirstFileA
GetCommandLineW
CreateDirectoryA
MoveFileA
CreateThread
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
GetModuleFileNameA
Process32First
CloseHandle
Process32Next
GetCurrentProcessId
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strchr
_strupr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
atoi
strstr
fopen
fseek
ftell
fread
fclose
strcpy
strcmp
strrchr
memcpy
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
sprintf
strncpy
_strlwr
memset
strncmp
strlen
strcat
_access
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ