DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IEGetWriteableHKCU
OpenURL
Static task
static1
Behavioral task
behavioral1
Sample
5ab4b0d79407b835875264c75c814a184f758738e65de31d284fe72044cb5e58.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5ab4b0d79407b835875264c75c814a184f758738e65de31d284fe72044cb5e58.dll
Resource
win10v2004-20230824-en
Target
5ab4b0d79407b835875264c75c814a184f758738e65de31d284fe72044cb5e58
Size
865KB
MD5
dfad176f0a55be7333f528dbab382cfe
SHA1
53db092fe031bac931c1abf4f04e932743935d7c
SHA256
5ab4b0d79407b835875264c75c814a184f758738e65de31d284fe72044cb5e58
SHA512
3f5199b8b53cda42f7235490df6a7a8c6195bc3abd409c601c9d7b7fe66592e64c745e659c63151b84bc843c9112401b6cfd3e8de83acb8a4af42d18edc2d953
SSDEEP
12288:RnFO/kOTK/de9rNu2V3u9f+l48ZIHBqEfVuHecJMxHP:RnFO/VTK/de9rNE9pIcVitMx
Checks for missing Authenticode signature.
resource |
---|
5ab4b0d79407b835875264c75c814a184f758738e65de31d284fe72044cb5e58 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
vDbgPrintExWithPrefix
RegCloseKey
RegOpenKeyW
RegQueryValueExW
CreateStatusWindowW
ImageList_Destroy
ImageList_LoadImageW
CloseHandle
CreateFileW
CreateProcessW
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
EnumResourceNamesW
ExitProcess
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
GlobalFree
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrlenA
lstrlenW
__dllonexit
_amsg_exit
_assert
_initterm
_iob
_lock
_onexit
_unlock
_vsnprintf
_wcsnicmp
abort
bsearch
calloc
free
fwrite
malloc
memcmp
memmove
sprintf
strchr
strcmp
strcpy
strcspn
strncmp
swprintf
vfprintf
wcschr
wcstol
CoCreateInstance
CoInitialize
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
CreateStreamOnHGlobal
OleRegGetUserType
PropVariantClear
StgCreateStorageEx
LoadRegTypeLib
SafeArrayAccessData
SafeArrayCreateVector
SafeArrayDestroy
SafeArrayGetDim
SafeArrayGetElement
SafeArrayGetElemsize
SafeArrayGetUBound
SafeArrayUnaccessData
SysAllocString
SysAllocStringLen
SysFreeString
VariantClear
VariantInit
SHGetFolderPathW
ShellAboutW
ShellExecuteExW
ShellExecuteW
PathAppendW
PathCreateFromUrlW
PathFindExtensionW
PathIsURLW
SHRegCloseUSKey
SHRegEnumUSValueW
SHRegOpenUSKeyW
SHRegQueryUSValueW
ord167
UrlApplySchemeW
CoInternetParseUrl
CreateAsyncBindCtx
CreateURLMoniker
CreateURLMonikerEx2
ReleaseBindInfo
GetDeviceCaps
CreatePopupMenu
CreateWindowExW
DdeCmpStringHandles
DdeCreateStringHandleW
DdeFreeStringHandle
DdeGetData
DdeGetLastError
DdeInitializeW
DdeNameService
DdeUninitialize
DefWindowProcW
DestroyIcon
DestroyWindow
DialogBoxParamW
DispatchMessageW
EnableWindow
EndDialog
GetClientRect
GetDC
GetDlgItem
GetMenuItemCount
GetMenuItemInfoW
GetMessageW
GetPropW
GetSubMenu
GetSystemMetrics
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
InflateRect
InsertMenuItemW
IsWindowVisible
LoadCursorW
LoadIconW
LoadImageW
LoadMenuW
LoadStringW
PostMessageW
PostQuitMessage
RegisterClassExW
ReleaseDC
SendMessageW
SetFocus
SetMenu
SetPropW
SetWindowLongW
SetWindowPos
ShowWindow
TranslateMessage
UnregisterClassW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IEGetWriteableHKCU
OpenURL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ