DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
75eb56df3ff7c841aabb7d5048356bdf.dll
Resource
win7-20231215-en
Target
75eb56df3ff7c841aabb7d5048356bdf
Size
52KB
MD5
75eb56df3ff7c841aabb7d5048356bdf
SHA1
7501a19b8d7605fff4fe282eefe5ffcca5332a51
SHA256
6b936bfe87e670148e67dd918fa2bbda32f5c694b13a36f7a3afdee480b5eec2
SHA512
0b3ad233bc66e64b8abc0fd68e361d62cff2801edf4de3cfadf46a69084c7eedd76f6f78641c3dfd78a5cb39146200117a2502a9a411e1db70a5a9c5ffaaa404
SSDEEP
1536:Iu8bmxVQD18DJ6kG1GgErLxkiSnkknWfLA:Iu8+VQD18Td6iSL6LA
Checks for missing Authenticode signature.
resource |
---|
75eb56df3ff7c841aabb7d5048356bdf |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
RemoveDirectoryA
LocalFree
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCommandLineW
GetExitCodeProcess
EnterCriticalSection
WaitForSingleObject
GetSystemDirectoryA
MoveFileA
SetFileAttributesA
GetCurrentProcessId
CreateThread
ExitProcess
Process32Next
Process32First
CreateDirectoryA
LeaveCriticalSection
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
DeleteFileA
WritePrivateProfileStringA
Sleep
GetModuleFileNameA
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
LoadLibraryA
FreeLibrary
GetProcAddress
CloseHandle
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
strcat
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
strcmp
atoi
strncmp
strchr
strncpy
strlen
_purecall
memcmp
??3@YAXPAX@Z
sprintf
fclose
fread
memset
??2@YAPAXI@Z
ftell
fseek
fopen
_strupr
strrchr
strstr
memcpy
strcpy
_access
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ