DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7e14bedc4960916a1cc0a7a984dd183c.dll
Resource
win7-20231215-en
Target
7e14bedc4960916a1cc0a7a984dd183c
Size
52KB
MD5
7e14bedc4960916a1cc0a7a984dd183c
SHA1
7973579a33c08c43c54e378ebf206cba09a9c0d8
SHA256
bdb11ebf50b864c4671485f7c502c883329e3763cf587b3d1d201198702a2bed
SHA512
cc41d9c8015b6ff09c41b554cec4cca6ad59b43d5ca879dd125c357366e4cf4aa116c752d2a1605ef75be0f3cab77e9213bd37ab816f6d8b6bf3fc92d1953535
SSDEEP
1536:aeNGjZBYm3bKPMa3lGIcTs0495+i67M72Nhj7ev:axvbKKTsBn6THe
Checks for missing Authenticode signature.
resource |
---|
7e14bedc4960916a1cc0a7a984dd183c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateThread
Sleep
GetExitCodeProcess
SetFileAttributesA
Process32Next
Process32First
ExitProcess
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
WritePrivateProfileStringA
FreeLibrary
GetCurrentProcessId
lstrlenW
WideCharToMultiByte
DeleteFileA
RemoveDirectoryA
GetCommandLineW
CreateDirectoryA
LocalFree
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
CloseHandle
lstrlenA
MultiByteToWideChar
GetProcAddress
LoadLibraryA
MoveFileA
RegEnumKeyExA
RegSetValueExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryValueExA
RegCreateKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
fclose
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
strcmp
strncmp
strncpy
memcmp
_purecall
memcpy
strrchr
sprintf
??3@YAXPAX@Z
memset
strstr
_access
strcat
atoi
strchr
strlen
strcpy
_strupr
fread
??2@YAPAXI@Z
ftell
fseek
fopen
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ