DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RouteTheCall
Static task
static1
Behavioral task
behavioral1
Sample
6a9c174977388d34b0588eb2f58445769c49ecd8571699b80513a29b27000f3a.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6a9c174977388d34b0588eb2f58445769c49ecd8571699b80513a29b27000f3a.dll
Resource
win10v2004-20230703-en
Target
6a9c174977388d34b0588eb2f58445769c49ecd8571699b80513a29b27000f3a
Size
1.2MB
MD5
33157bb1eb0dc1dc7ee588148e5afe2e
SHA1
1e7e7257c4b8af84820d9e126332bd17e7a39e53
SHA256
6a9c174977388d34b0588eb2f58445769c49ecd8571699b80513a29b27000f3a
SHA512
1afc3ac7bde3aec24b6054a86c7ffa46ea7f0df6a76cfd25c221686e6b952cc64968aea5e71fc1da3e36897f409087bee2693f76e89f377f72f6e7e35a952e3d
SSDEEP
12288:LqfTQGqnSu6K6WehYHSK/LEyRMe4bdcKrqnZ0DvU/NKu83dB4MmJcXqJD3l+s0CF:+TQ6KFehmKWncBXmBD3l
Checks for missing Authenticode signature.
resource |
---|
6a9c174977388d34b0588eb2f58445769c49ecd8571699b80513a29b27000f3a |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegOpenKeyW
RegSetValueExW
CreatePropertySheetPageW
PropertySheetW
CloseHandle
CreateFileA
CreateFileW
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
DisableThreadLibraryCalls
DosDateTimeToFileTime
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushInstructionCache
FormatMessageA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileTime
GetFullPathNameW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockResource
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
SetFilePointer
SetFileTime
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpiW
lstrcpynA
lstrlenW
__dllonexit
_amsg_exit
_beginthreadex
_initterm
_iob
_lock
_memicmp
_onexit
_stricmp
_strnicmp
_unlock
_vscprintf
_vscwprintf
_vsnwprintf
abort
calloc
free
fwrite
iswspace
malloc
memcmp
memcpy
memmove
memset
rand
realloc
sprintf
srand
strchr
strcmp
strcpy
strncmp
strrchr
time
vfprintf
vsprintf
vswprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsstr
wcstol
wcstoul
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
ProgIDFromCLSID
ReleaseStgMedium
StringFromGUID2
SysAllocStringLen
SysFreeString
CDefFolderMenu_Create2
ord83
DragQueryFileW
ILClone
ILCombine
ILGetNext
SHAlloc
SHBrowseForFolderW
SHChangeNotify
SHCreateFileExtractIconW
SHCreateShellFolderView
SHGetFileInfoA
SHGetFolderPathW
SHGetPathFromIDListW
SHParseDisplayName
SHPathPrepareForWriteA
ShellExecuteW
PathAddBackslashW
PathAppendW
PathCombineA
PathCompactPathW
PathFileExistsW
PathFindFileNameA
PathIsDirectoryW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecA
PathRemoveFileSpecW
PathStripPathA
SHRegGetValueW
SHStrDupW
StrFormatByteSizeW
CharLowerBuffA
CharUpperBuffW
CheckDlgButton
DialogBoxParamW
EnableWindow
EndDialog
GetDC
GetDesktopWindow
GetDlgItem
GetDlgItemTextA
GetMonitorInfoW
GetParent
GetWindowLongW
GetWindowRect
GetWindowTextLengthA
GetWindowTextLengthW
GetWindowTextW
InsertMenuW
IsDlgButtonChecked
LoadIconW
LoadStringW
MessageBoxA
MessageBoxW
MonitorFromWindow
MoveWindow
PostMessageW
ReleaseDC
SendDlgItemMessageW
SendMessageCallbackW
SendMessageW
SetDlgItemTextA
SetDlgItemTextW
SetWindowLongW
ShowWindow
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RouteTheCall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ