DllCanUnloadNow
DllGetClassObject
DllGetVersion
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
5dba200ca5709734d234e2d021fa08e544044da1e223f517036d8fe402f1558d.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5dba200ca5709734d234e2d021fa08e544044da1e223f517036d8fe402f1558d.dll
Resource
win10v2004-20230703-en
Target
5dba200ca5709734d234e2d021fa08e544044da1e223f517036d8fe402f1558d
Size
1.6MB
MD5
55dd23871229b2458a6a3cc6a6f26eb1
SHA1
c6af30bdc7f39d7b7234543e10cd6387fbbadcbc
SHA256
5dba200ca5709734d234e2d021fa08e544044da1e223f517036d8fe402f1558d
SHA512
56565a74d13ebd1e14599cfe9e8755435ed354ef871cb663a051fdf7ebb28a5402dc96bcfb679c8217e58fe837485cb11675f3613fb2a23690c907e6819ccc94
SSDEEP
24576:hPE6T4sArpNuAGbzh4aj7UbR+6R3NVx9:2ODZAGb6KUbR+Ob
Checks for missing Authenticode signature.
resource |
---|
5dba200ca5709734d234e2d021fa08e544044da1e223f517036d8fe402f1558d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
vDbgPrintExWithPrefix
RegCloseKey
RegCreateKeyExW
RegCreateKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
RegQueryValueW
RegSetValueExW
ord320
ord327
ord321
ord323
ord324
GetEffectiveClientRect
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
ImageList_GetIcon
ImageList_LoadImageW
InitCommonControlsEx
PropertySheetW
CloseHandle
CreateEventW
CreateFileMappingW
CreateFileW
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushInstructionCache
FreeLibrary
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetFileAttributesW
GetFileSize
GetFullPathNameW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
LockResource
MapViewOfFile
MultiByteToWideChar
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReleaseSemaphore
SetEvent
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
lstrcmpiW
lstrlenW
WNetDisconnectDialog
__dllonexit
_amsg_exit
_initterm
_iob
_lock
_memicmp
_onexit
_snwprintf
_strnicmp
_unlock
_vscwprintf
_vsnprintf
_vsnwprintf
_wcsnicmp
abort
bsearch
calloc
fputc
fputs
free
fwrite
iswspace
malloc
memcmp
memcpy
memmove
memset
realloc
sprintf
strchr
strcmp
strcpy
strcspn
strlen
strncmp
strrchr
swprintf
vfprintf
vsprintf
vswprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsncpy
wcspbrk
wcsrchr
wcsstr
wcstol
wcstoul
_write
CLSIDFromString
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
CreateStreamOnHGlobal
DoDragDrop
GetHGlobalFromStream
OleFlushClipboard
OleInitialize
OleUninitialize
RegisterDragDrop
RevokeDragDrop
StringFromGUID2
LoadTypeLib
RegisterTypeLib
SafeArrayCreateVector
SysAllocString
SysFreeString
SysStringLen
UnRegisterTypeLib
VariantClear
VariantInit
ILClone
ILCombine
ILCreateFromPathW
ILFindChild
ILFindLastID
ILFree
ord186
ILGetNext
ILGetSize
ILIsEqual
ILRemoveLastID
ReadCabinetState
SHAlloc
SHBindToParent
SHBrowseForFolderW
SHChangeNotifyRegister
SHCoCreateInstance
SHCreateShellFolderView
SHFree
SHGetDesktopFolder
SHGetFolderLocation
SHGetFolderPathAndSubDirW
SHGetImageList
SHGetInstanceExplorer
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHMapPIDLToSystemImageListIndex
SHOpenFolderAndSelectItems
SHParseDisplayName
SHSetInstanceExplorer
ShellAboutW
ShellExecuteExW
ShellMessageBoxW
Shell_GetImageLists
Shell_MergeMenus
ord270
ord164
ord175
ord172
ord481
ord509
ord176
ord163
ord174
ord478
ord479
PathAddBackslashW
PathCombineW
PathFileExistsW
PathFindFileNameW
PathGetArgsW
PathIsDirectoryW
PathIsRootW
PathMatchSpecW
PathStripToRootW
ord7
SHAutoComplete
ord182
ord16
SHCreateThreadRef
ord278
ord181
ord10
ord193
ord192
SHGetValueW
ord279
ord8
ord178
SHRegGetBoolUSValueW
SHRegSetUSValueW
SHSetValueW
ord9
StrChrW
StrCmpIW
StrCmpLogicalW
StrDupW
StrFromTimeIntervalW
StrRetToBufW
StrToIntW
wnsprintfW
SetWindowTheme
BitBlt
CreateCompatibleDC
CreateFontIndirectW
DeleteDC
DeleteObject
ExtTextOutW
GetObjectW
OffsetWindowOrgEx
SelectObject
SetBkColor
SetWindowOrgEx
AllowSetForegroundWindow
AppendMenuW
BeginDeferWindowPos
BeginPaint
CallWindowProcW
CharNextW
CharPrevW
CheckDlgButton
CheckMenuItem
CreateDialogParamW
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DeferWindowPos
DeleteMenu
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawEdge
DrawTextW
EnableWindow
EndDeferWindowPos
EndPaint
FindWindowW
GetAncestor
GetClientRect
GetDlgCtrlID
GetDlgItem
GetDlgItemTextW
GetFocus
GetKeyState
GetMenuItemCount
GetMenuItemInfoW
GetMessagePos
GetMessageW
GetParent
GetPropW
GetShellWindow
GetSubMenu
GetSystemMetrics
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetWindowThreadProcessId
InsertMenuItemW
InsertMenuW
InvalidateRect
IsChild
IsDialogMessageW
IsDlgButtonChecked
IsIconic
IsMenu
IsWindow
IsWindowVisible
KillTimer
LoadAcceleratorsW
LoadBitmapW
LoadCursorW
LoadIconW
LoadImageW
LoadMenuW
LoadStringW
LockWindowUpdate
MapWindowPoints
MessageBoxW
PostMessageW
PostQuitMessage
PostThreadMessageW
RegisterClassExW
RegisterWindowMessageW
ReleaseCapture
RemoveMenu
RemovePropW
ScreenToClient
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCapture
SetCursor
SetDlgItemTextW
SetFocus
SetMenuItemInfoW
SetParent
SetPropW
SetTimer
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TrackPopupMenuEx
TranslateAcceleratorW
TranslateMessage
UpdateWindow
wsprintfW
DllCanUnloadNow
DllGetClassObject
DllGetVersion
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ