DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f19bac4fda781aab98137c13c80da1a8cb5754283061e46fe7093034bf97d36a.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f19bac4fda781aab98137c13c80da1a8cb5754283061e46fe7093034bf97d36a.dll
Resource
win10v2004-20230703-en
Target
f19bac4fda781aab98137c13c80da1a8cb5754283061e46fe7093034bf97d36a
Size
239KB
MD5
68a79829b148ec6c84ee319adce8afd0
SHA1
83ccf4e47864393fb6e8374751f49ee3a5012ea6
SHA256
f19bac4fda781aab98137c13c80da1a8cb5754283061e46fe7093034bf97d36a
SHA512
9d0d0f5de208b9cda2ee4e15116a3ec94f7239b2edd0d86470c2cef8b5dd783b2daec4ae2c55b4499e31b1d9a3fe55e29ba6fba96ba89908e931000ddd9374d4
SSDEEP
6144:7J+YYFUN2v+QRABVfk4eYvmdrm1FXhojvohR0U5l:7J+YYpvRAHk4joDoj5
Checks for missing Authenticode signature.
resource |
---|
f19bac4fda781aab98137c13c80da1a8cb5754283061e46fe7093034bf97d36a |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetModuleFileNameW
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
MultiByteToWideChar
WideCharToMultiByte
GetSystemInfo
GetCurrentProcessId
GetVersionExW
CreateThread
Sleep
GetPrivateProfileStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
SizeofResource
lstrcmpiW
LoadLibraryExW
GetModuleFileNameA
GetModuleHandleW
FindResourceW
GetPrivateProfileIntW
WritePrivateProfileStringW
EncodePointer
DecodePointer
GetThreadLocale
SetThreadLocale
FindNextFileW
FindFirstFileW
CreateFileW
CloseHandle
FindClose
WriteFile
GetLastError
FreeLibrary
LoadLibraryW
GetCurrentProcess
GetProcAddress
WriteConsoleW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetACP
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
IsDebuggerPresent
OutputDebugStringW
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
InterlockedFlushSList
CharNextW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
LookupAccountSidW
GetTokenInformation
OpenProcessToken
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
StringFromGUID2
CoTaskMemFree
SysFreeString
SysStringLen
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
SysAllocString
RegisterTypeLi
UnRegisterTypeLi
StrStrIA
PathFileExistsW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ