DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RouteTheCall
Static task
static1
Behavioral task
behavioral1
Sample
88f3f74facd42c78019e76c4201bcbde9e7297d1f0f00b194c10b2ad84eb4f2e.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
88f3f74facd42c78019e76c4201bcbde9e7297d1f0f00b194c10b2ad84eb4f2e.dll
Resource
win10v2004-20230703-en
Target
88f3f74facd42c78019e76c4201bcbde9e7297d1f0f00b194c10b2ad84eb4f2e
Size
764KB
MD5
450f2de90f181371b02ba25815178521
SHA1
42fed1550c70b0264ca30e49110653787375b12d
SHA256
88f3f74facd42c78019e76c4201bcbde9e7297d1f0f00b194c10b2ad84eb4f2e
SHA512
1ca5232b32c3adffb7ad374df3a4c8bffc9ae9df75e8b189d7a70ba4b6c27036bc188cf396ec20cedb21ab4b25554c0b767bf249de992176338c9968d57c6106
SSDEEP
12288:n9FlX9KE8d5z3ebZ0T3lgHMllNrXAJSqDYUKGQMv9ROWMlq6eE9xiq3m+qPn:n9PX/g5CbZ0TVFlTyD
Checks for missing Authenticode signature.
resource |
---|
88f3f74facd42c78019e76c4201bcbde9e7297d1f0f00b194c10b2ad84eb4f2e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegOpenKeyW
RegSetValueExW
CreatePropertySheetPageW
PropertySheetW
CloseHandle
CreateFileA
CreateFileW
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
DisableThreadLibraryCalls
DosDateTimeToFileTime
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushInstructionCache
FormatMessageA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileTime
GetFullPathNameW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockResource
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReadFile
ReleaseSemaphore
SetFilePointer
SetFileTime
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpiW
lstrlenW
__dllonexit
_amsg_exit
_beginthreadex
_initterm
_iob
_lock
_memicmp
_onexit
_stricmp
_strnicmp
_unlock
_vscwprintf
_vsnwprintf
abort
calloc
fputc
fputs
free
fwrite
iswspace
malloc
memcmp
memcpy
memmove
memset
rand
realloc
sprintf
srand
strchr
strcmp
strcpy
strlen
strncmp
strrchr
time
vfprintf
vsprintf
vswprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsstr
wcstol
wcstoul
_write
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
ProgIDFromCLSID
ReleaseStgMedium
StringFromGUID2
LoadTypeLib
RegisterTypeLib
SysAllocString
SysAllocStringLen
SysFreeString
UnRegisterTypeLib
CDefFolderMenu_Create2
ord83
DragQueryFileW
ILClone
ILCombine
ILGetNext
SHAlloc
SHBrowseForFolderW
SHChangeNotify
SHCreateFileExtractIconW
SHCreateShellFolderView
SHGetFileInfoA
SHGetFolderPathW
SHGetPathFromIDListW
SHParseDisplayName
SHPathPrepareForWriteA
ShellExecuteW
PathAddBackslashW
PathAppendW
PathCombineA
PathCompactPathW
PathFileExistsW
PathFindFileNameA
PathIsDirectoryW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecW
SHRegGetValueW
SHStrDupW
StrFormatByteSizeW
CharLowerBuffA
CharUpperBuffW
CheckDlgButton
DialogBoxParamW
EnableWindow
EndDialog
GetDC
GetDesktopWindow
GetDlgItem
GetDlgItemTextA
GetDlgItemTextW
GetParent
GetWindowRect
GetWindowTextLengthA
GetWindowTextLengthW
InsertMenuW
IsDlgButtonChecked
LoadIconW
LoadStringW
MessageBoxW
MoveWindow
PostMessageW
ReleaseDC
SendDlgItemMessageW
SendMessageCallbackW
SendMessageW
SetDlgItemTextA
SetDlgItemTextW
SetWindowLongW
ShowWindow
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RouteTheCall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ