DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
587921dda3b5e43125238025f123988c.dll
Resource
win7-20231215-en
Target
587921dda3b5e43125238025f123988c
Size
48KB
MD5
587921dda3b5e43125238025f123988c
SHA1
a22121213f955e9ed39ac3e454e135761b5a61ee
SHA256
e9ce2623b9e1d66fac9ea7aa77157de572f8ce6d11d13a276b81630c3550ea36
SHA512
0c2bb6c94d5c07ddcaa7146633ee804f9db62d5d85db0b971621984cdf0fbce2639cd0c1ab1e86846319e4c582c50d7db0cd0e6f6cb37eb6642325715bf06de5
SSDEEP
768:+P/ZnZOF3xbaV2cgC73aSxLbmwmEb3EnxGOM8CiI5b4GFIs2crzkOLu:qHIG0CT3xeREb3ExpsSGFRbzkOL
Checks for missing Authenticode signature.
resource |
---|
587921dda3b5e43125238025f123988c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
CloseHandle
Process32Next
Process32First
Sleep
WideCharToMultiByte
ExitProcess
CreateProcessA
GetSystemDirectoryA
FreeLibrary
LoadLibraryA
LocalFree
GetModuleHandleA
GetProcAddress
GetExitCodeProcess
WaitForSingleObject
FindNextFileA
DeleteFileA
GetPrivateProfileStringA
FindFirstFileA
MoveFileA
SetFileAttributesA
GetCurrentProcessId
CreateThread
CreateDirectoryA
WritePrivateProfileStringA
GetCommandLineW
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
SetEntriesInAclA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
GetNamedSecurityInfoA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
strncpy
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
_access
strcmp
strrchr
atoi
strcat
strstr
strlen
memcpy
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
strcpy
sprintf
_strupr
strchr
memset
strncmp
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ