DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
52f49b116a9016d0710774d0e4d3f2ca.dll
Resource
win7-20231215-en
Target
52f49b116a9016d0710774d0e4d3f2ca
Size
52KB
MD5
52f49b116a9016d0710774d0e4d3f2ca
SHA1
c3c1d69c4a7ef4162635c2f66d370274d3f56b0b
SHA256
35c66c054b9a0b1f2cccf5d83155b2c706685b5ef065594993680132734ae1d2
SHA512
3530640373ef962ee7c8efa041750a95c433961a542010aa1cf402782600be276e5e3bbebf4d66de22fe82ba900270191a15f71decef5f8d4e0d9b7e0a7ad691
SSDEEP
1536:vcp67wpn7skyoVaJK1CEZOiPxAolyWEZ:vcHp7sE1PAocW
Checks for missing Authenticode signature.
resource |
---|
52f49b116a9016d0710774d0e4d3f2ca |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetCommandLineW
LocalFree
GetProcAddress
LoadLibraryA
CloseHandle
Process32Next
Process32First
WideCharToMultiByte
GetModuleHandleA
Sleep
CreateDirectoryA
WritePrivateProfileStringA
MoveFileA
ExitProcess
FreeLibrary
CreateThread
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
RemoveDirectoryA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
GetCurrentProcessId
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
DeleteFileA
SetFileAttributesA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegQueryValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
CommandLineToArgvW
SHGetSpecialFolderPathA
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
fopen
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
strcmp
_access
strlen
strncmp
strncpy
strcpy
memcmp
strstr
strrchr
sprintf
??3@YAXPAX@Z
fclose
fread
memset
??2@YAPAXI@Z
ftell
fseek
_strupr
strcat
atoi
strchr
memcpy
_purecall
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ