DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IEGetWriteableHKCU
OpenURL
Static task
static1
Behavioral task
behavioral1
Sample
212e22eea2c22088384871ea64cbf7fbefb2496a4a736ecc83f392fbf0ba3774.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
212e22eea2c22088384871ea64cbf7fbefb2496a4a736ecc83f392fbf0ba3774.dll
Resource
win10v2004-20230831-en
Target
212e22eea2c22088384871ea64cbf7fbefb2496a4a736ecc83f392fbf0ba3774
Size
723KB
MD5
a5c1198fca5739e417fe83d4b73fcf4b
SHA1
7b2044fa9eb08b7d532b7aa3b78dff59912b963c
SHA256
212e22eea2c22088384871ea64cbf7fbefb2496a4a736ecc83f392fbf0ba3774
SHA512
0d12cf83e7a6552140df4f20c8336fafb5defbfafc7da2413e1a21169d2e98a76b0f1cc43f4c60fe97689fdcb801c4c9246d677048188388633935565bedfd4d
SSDEEP
12288:OiSQCEKnWLWpgeVymi6emphPq0cBU7TfPbIMPIxniWjEny+l48ZILRaEqnESE6AZ:DSQCEKnWLWpgeVymi6emphPq0cBU7Tf7
Checks for missing Authenticode signature.
resource |
---|
212e22eea2c22088384871ea64cbf7fbefb2496a4a736ecc83f392fbf0ba3774 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
vDbgPrintExWithPrefix
RegCloseKey
RegOpenKeyW
RegQueryValueExW
CreateStatusWindowW
ImageList_Destroy
ImageList_LoadImageW
CloseHandle
CreateFileW
CreateProcessW
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
EnumResourceNamesW
ExitProcess
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileStringW
GetProcAddress
GetProcessHeap
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
GlobalFree
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrlenA
lstrlenW
__dllonexit
_amsg_exit
_assert
_initterm
_iob
_lock
_onexit
_unlock
_vsnprintf
_wcsnicmp
abort
bsearch
calloc
free
fwrite
memcmp
memmove
sprintf
strchr
strcmp
strcpy
strcspn
strncmp
swprintf
vfprintf
wcschr
wcstol
CoCreateInstance
CoInitialize
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
CreateStreamOnHGlobal
OleRegGetUserType
PropVariantClear
StgCreateStorageEx
LoadRegTypeLib
SafeArrayAccessData
SafeArrayCreateVector
SafeArrayDestroy
SafeArrayGetDim
SafeArrayGetElement
SafeArrayGetElemsize
SafeArrayGetUBound
SafeArrayUnaccessData
SysAllocString
SysAllocStringLen
SysFreeString
VariantClear
VariantInit
SHGetFolderPathW
ShellAboutW
ShellExecuteExW
ShellExecuteW
PathAppendW
PathCreateFromUrlW
PathFindExtensionW
PathIsURLW
SHRegCloseUSKey
SHRegEnumUSValueW
SHRegOpenUSKeyW
SHRegQueryUSValueW
ord167
UrlApplySchemeW
CoInternetParseUrl
CreateAsyncBindCtx
CreateURLMoniker
CreateURLMonikerEx2
ReleaseBindInfo
GetDeviceCaps
CreatePopupMenu
CreateWindowExW
DdeCmpStringHandles
DdeCreateStringHandleW
DdeFreeStringHandle
DdeGetData
DdeGetLastError
DdeInitializeW
DdeNameService
DdeUninitialize
DefWindowProcW
DestroyIcon
DestroyWindow
DialogBoxParamW
DispatchMessageW
EnableWindow
EndDialog
GetClientRect
GetDC
GetDlgItem
GetMenuItemCount
GetMenuItemInfoW
GetMessageW
GetPropW
GetSubMenu
GetSystemMetrics
GetWindowLongW
GetWindowTextLengthW
GetWindowTextW
InflateRect
InsertMenuItemW
IsWindowVisible
LoadCursorW
LoadIconW
LoadImageW
LoadMenuW
LoadStringW
PostMessageW
PostQuitMessage
RegisterClassExW
ReleaseDC
SendMessageW
SetFocus
SetMenu
SetPropW
SetWindowLongW
SetWindowPos
ShowWindow
TranslateMessage
UnregisterClassW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IEGetWriteableHKCU
OpenURL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ