DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetClientTicket
Static task
static1
Behavioral task
behavioral1
Sample
75187da35813a4f12d2ad8db0c847300.dll
Resource
win7-20231215-en
Target
75187da35813a4f12d2ad8db0c847300
Size
142KB
MD5
75187da35813a4f12d2ad8db0c847300
SHA1
b6f990b84e994ae042ba649c5987a1a2f3b9436b
SHA256
1169084106989c362b8333d552e4464016d0c102a8ee0356ae9ea45f5402dbcb
SHA512
881a6dfb6767af32aaf52d230e40a5c2d8a72591d43dfe601084254b13b985843175562c9ddfd0a057a391d98620e54bb6802e956afda5bdf41ce360ed0fc1a6
SSDEEP
1536:wA2D7PJjH/9Fa9i7uDxJU4exSVhqZ2dCcN2Zy1nnoN6dB507GpNJjUa:c7RHWV97hm28jy5oN6dB5RTJZ
Checks for missing Authenticode signature.
Processes:
resource |
---|
75187da35813a4f12d2ad8db0c847300 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetCrackUrlA
InternetSetCookieA
InternetGetConnectedState
InternetOpenA
InternetConnectA
HttpOpenRequestA
StrStrIA
PathFileExistsA
wnsprintfA
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetProcAddress
lstrlenA
lstrlenW
GetModuleHandleW
SetThreadLocale
GetThreadLocale
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
HeapReAlloc
HeapAlloc
TerminateThread
GetModuleFileNameA
GetProcessHeap
CloseHandle
LocalFree
LoadLibraryA
GetCurrentProcess
CreateProcessA
WriteFile
CreateFileA
GetTempPathA
lstrcmpA
SleepEx
ReleaseMutex
WaitForSingleObject
CreateMutexA
Sleep
CreateThread
GetVolumeInformationA
GetComputerNameA
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitializeCriticalSection
RaiseException
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapFree
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
CharNextA
CharNextW
RegCreateKeyA
RegOpenKeyA
LookupAccountNameA
ConvertSidToStringSidA
RegQueryValueExA
OpenProcessToken
DuplicateTokenEx
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
VariantClear
VariantInit
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetClientTicket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ