DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
c0e8212be68483b152c4dcfbebc8ab173fb8ef0d6b5cdc176afc482d00a66533.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c0e8212be68483b152c4dcfbebc8ab173fb8ef0d6b5cdc176afc482d00a66533.dll
Resource
win10v2004-20230703-en
Target
c0e8212be68483b152c4dcfbebc8ab173fb8ef0d6b5cdc176afc482d00a66533
Size
664KB
MD5
ec18f903ed10bf0cbb5efb8ef2005707
SHA1
f99be47b7590a6a36e6ff881145dbc8e33f9f8fb
SHA256
c0e8212be68483b152c4dcfbebc8ab173fb8ef0d6b5cdc176afc482d00a66533
SHA512
40273cf3a4a3d80e287954de2538d90a4a67b22855c431600996a3e30fa2b4515d72ac6c32abbdccc9023b23099c72ddb4c4e4c2a153e0e843d4690ab9c91977
SSDEEP
12288:9t9J4Defc1ddeU9bNy8R6Mjf9fDikPApu2Ilk9oid3mBd3X3uw:96Dwc1dm8R6of9GD9ld3mBd3X3v
Checks for missing Authenticode signature.
resource |
---|
c0e8212be68483b152c4dcfbebc8ab173fb8ef0d6b5cdc176afc482d00a66533 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
CompareStringA
Sleep
GetCurrentProcess
GetCurrentThread
SetThreadPriority
SetPriorityClass
GetSystemDirectoryW
SetThreadExecutionState
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetSystemTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
SystemTimeToFileTime
CompareStringW
MultiByteToWideChar
WideCharToMultiByte
GetCPInfo
IsDBCSLeadByte
GetModuleHandleExW
GetLocaleInfoW
GetNumberFormatW
GetLogicalDrives
GetTempPathW
SetCurrentDirectoryW
LockResource
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
GetDateFormatW
GetTimeFormatW
WaitForSingleObject
RtlUnwind
WriteConsoleW
HeapSize
GetStringTypeW
SetStdHandle
GetProcessHeap
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
FindResourceW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileSizeEx
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
QueryPerformanceFrequency
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
InterlockedFlushSList
RtlUnwindEx
RaiseException
RtlPcToFileHeader
LocalFree
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
GetModuleHandleW
CreateEventW
SizeofResource
LoadResource
FoldStringW
GetModuleFileNameW
GetFullPathNameW
GetCurrentDirectoryW
GetVersionExW
FindNextFileW
CreateFileW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
MoveFileW
GetCurrentProcessId
DeviceIoControl
SetFileAttributesW
RemoveDirectoryW
GetFileAttributesW
GetDriveTypeW
GetDiskFreeSpaceExW
LoadLibraryExW
DeleteFileW
CreateDirectoryW
GetFileTime
GetFileType
FlushFileBuffers
GetStdHandle
SetLastError
LoadLibraryW
GetProcAddress
FreeLibrary
GetLastError
CloseHandle
WriteFile
SetFileTime
SetFilePointer
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
SetEndOfFile
ReadFile
GetFileSize
FreeEnvironmentStringsW
InvalidateRect
SetWindowTextW
GetParent
ReleaseDC
OemToCharA
EnableWindow
GetDlgItem
ShowWindow
SendMessageW
wsprintfW
GetDC
SetWindowPos
GetMonitorInfoW
MonitorFromPoint
LoadImageW
SetWindowLongPtrW
EqualRect
GetSysColor
GetCursorPos
EndPaint
BeginPaint
InsertMenuItemW
AppendMenuW
CreatePopupMenu
SendDlgItemMessageW
DestroyWindow
EnumDisplayMonitors
CopyImage
MapWindowPoints
MessageBoxW
FlashWindowEx
CreateWindowExW
CreateIcon
LoadCursorW
SetCursor
GetWindowTextLengthW
GetWindowTextW
CharLowerW
CharUpperW
OemToCharBuffA
LoadStringW
GetWindow
GetClassNameW
GetWindowLongPtrW
SetWindowLongW
GetWindowLongW
GetWindowRect
GetClientRect
SetMenuItemInfoW
GetMenuItemInfoW
GetSystemMetrics
SetDlgItemTextW
SetPixel
GetPixel
GetObjectW
CreateDIBSection
StretchBlt
GetDeviceCaps
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
GetTextExtentPoint32W
TextOutW
SetTextColor
LineTo
DeleteObject
CreatePen
GetTextFaceW
GetTextMetricsW
SelectObject
CreateFontW
MoveToEx
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExW
AllocateAndInitializeSid
CheckTokenMembership
IsTextUnicode
RegSetValueExW
RegEnumValueW
RegEnumKeyExW
RegCloseKey
RegDeleteKeyExW
RegDeleteKeyW
RegCreateKeyExW
FreeSid
SHGetPathFromIDListW
ShellExecuteExW
SHGetMalloc
DragQueryFileW
SHGetSpecialFolderLocation
CoTaskMemFree
ReleaseStgMedium
CreateStreamOnHGlobal
CoCreateInstance
CoSetProxyBlanket
CoCreateFreeThreadedMarshaler
SysFreeString
VariantChangeType
VariantCopy
VariantClear
SysAllocString
SHStrDupW
ord8
DestroyPropertySheetPage
CreatePropertySheetPageW
GdipAlloc
GdipFree
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateHBITMAPFromBitmap
GradientFill
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ