DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RouteTheCall
Static task
static1
Behavioral task
behavioral1
Sample
fc9246b6a664b8c735e34c3d8f0a002f5ce76ae9d44de8101884a73b58d1db9d.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fc9246b6a664b8c735e34c3d8f0a002f5ce76ae9d44de8101884a73b58d1db9d.dll
Resource
win10v2004-20230824-en
Target
fc9246b6a664b8c735e34c3d8f0a002f5ce76ae9d44de8101884a73b58d1db9d
Size
764KB
MD5
ce6d6b3a25f886030f173d97cd12e5db
SHA1
3f26272041c99557ff8863db320b82b0317b140a
SHA256
fc9246b6a664b8c735e34c3d8f0a002f5ce76ae9d44de8101884a73b58d1db9d
SHA512
57229b71e88cf74177d0e8dede15db8d86277fef367cf134e21efeba5cb32a373d807e4e79d6f2d496530565c87b2cc3c0f0d1d6124178da01413b9477782845
SSDEEP
12288:q9FlX9KE8d5z3ebZ0T3lrHMllNrXAJSqDYUKGQMv9ROWMlq6eE9xiq3m+qPn:q9PX/g5CbZ0TVIlTyD
Checks for missing Authenticode signature.
resource |
---|
fc9246b6a664b8c735e34c3d8f0a002f5ce76ae9d44de8101884a73b58d1db9d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegOpenKeyW
RegSetValueExW
CreatePropertySheetPageW
PropertySheetW
CloseHandle
CreateFileA
CreateFileW
CreateSemaphoreA
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
DisableThreadLibraryCalls
DosDateTimeToFileTime
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushInstructionCache
FormatMessageA
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileTime
GetFullPathNameW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockResource
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReadFile
ReleaseSemaphore
SetFilePointer
SetFileTime
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpiW
lstrlenW
__dllonexit
_amsg_exit
_beginthreadex
_initterm
_iob
_lock
_memicmp
_onexit
_stricmp
_strnicmp
_unlock
_vscwprintf
_vsnwprintf
abort
calloc
fputc
fputs
free
fwrite
iswspace
malloc
memcmp
memcpy
memmove
memset
rand
realloc
sprintf
srand
strchr
strcmp
strcpy
strlen
strncmp
strrchr
time
vfprintf
vsprintf
vswprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsstr
wcstol
wcstoul
_write
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
ProgIDFromCLSID
ReleaseStgMedium
StringFromGUID2
LoadTypeLib
RegisterTypeLib
SysAllocString
SysAllocStringLen
SysFreeString
UnRegisterTypeLib
CDefFolderMenu_Create2
ord83
DragQueryFileW
ILClone
ILCombine
ILGetNext
SHAlloc
SHBrowseForFolderW
SHChangeNotify
SHCreateFileExtractIconW
SHCreateShellFolderView
SHGetFileInfoA
SHGetFolderPathW
SHGetPathFromIDListW
SHParseDisplayName
SHPathPrepareForWriteA
ShellExecuteW
PathAddBackslashW
PathAppendW
PathCombineA
PathCompactPathW
PathFileExistsW
PathFindFileNameA
PathIsDirectoryW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecW
SHRegGetValueW
SHStrDupW
StrFormatByteSizeW
CharLowerBuffA
CharUpperBuffW
CheckDlgButton
DialogBoxParamW
EnableWindow
EndDialog
GetDC
GetDesktopWindow
GetDlgItem
GetDlgItemTextA
GetDlgItemTextW
GetParent
GetWindowRect
GetWindowTextLengthA
GetWindowTextLengthW
InsertMenuW
IsDlgButtonChecked
LoadIconW
LoadStringW
MessageBoxW
MoveWindow
PostMessageW
ReleaseDC
SendDlgItemMessageW
SendMessageCallbackW
SendMessageW
SetDlgItemTextA
SetDlgItemTextW
SetWindowLongW
ShowWindow
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RouteTheCall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ