DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
59e97427e86c4d1de87b26cb7d755a99.dll
Resource
win7-20231215-en
Target
59e97427e86c4d1de87b26cb7d755a99
Size
76KB
MD5
59e97427e86c4d1de87b26cb7d755a99
SHA1
8f092f4681b165d5d3bc77ad4e6d841e8dbc3ec5
SHA256
bb1c8ef5b839a5924f55e679e3dafeb530a3e4d2f8876269cc1e85a66e1e0b17
SHA512
4ef834de3749c1dd0539edb3cafe4d7c61f9fc48619b2cf445931da92539dd3120801c7797a8ab5ba73c6dd7547d43097ea09fce41a30b18b1dc6fb8f1ef3b8f
SSDEEP
1536:MzQcCC/ygE58Vx9lOqHteVtPaRIExWde9z9reA:MQI9k+IEAde9Brn
Checks for missing Authenticode signature.
resource |
---|
59e97427e86c4d1de87b26cb7d755a99 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord541
ord6283
ord6282
ord6883
ord4129
ord5710
ord4274
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord3953
ord2725
ord1131
ord6467
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord801
ord4277
ord354
ord5186
ord269
ord273
ord823
ord5860
ord1979
ord603
ord665
ord879
ord1197
ord1243
ord342
ord1182
ord1577
ord1168
ord1575
ord1176
ord1116
ord2801
ord1969
ord939
ord860
ord941
ord924
ord922
ord858
ord6877
ord4202
ord2764
ord6663
ord4278
ord540
ord2915
ord5572
ord535
ord537
ord800
ord825
ord500
ord6142
ord2985
ord772
strncmp
isalpha
__isascii
iscntrl
isdigit
isgraph
isprint
ispunct
isxdigit
_mbsstr
isupper
islower
isspace
tolower
toupper
realloc
free
memcpy
_mbscmp
wcslen
_CxxThrowException
_mbslwr
memcmp
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
malloc
atoi
memset
sprintf
isalnum
__CxxFrameHandler
strlen
_purecall
lstrlenA
CloseHandle
CreateThread
GetProcAddress
LoadLibraryA
DeleteFileA
GetSystemDirectoryA
GetLastError
MultiByteToWideChar
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
lstrlenW
WideCharToMultiByte
LocalAlloc
LocalFree
LoadStringA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
ShellExecuteA
SysFreeString
LoadRegTypeLi
SysAllocString
SysStringLen
VariantClear
ord16
ord21
ord30
ord31
ord15
ord18
ord57
ord32
ord23
ord58
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
DeleteUrlCacheEntry
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ