ijlErrorStr
ijlFree
ijlGetLibVersion
ijlInit
ijlRead
ijlWrite
Behavioral task
behavioral1
Sample
41c2fb72dc07d8880a886f4b4945e549b83556678a873cd10f21d7304b1d3785.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
41c2fb72dc07d8880a886f4b4945e549b83556678a873cd10f21d7304b1d3785.dll
Resource
win10v2004-20230915-en
Target
41c2fb72dc07d8880a886f4b4945e549b83556678a873cd10f21d7304b1d3785
Size
15.2MB
MD5
743df10e1dbfd3dca9d05c2ee34f55b4
SHA1
2d142dd48d095820940b602bb677ee1f342fc96b
SHA256
41c2fb72dc07d8880a886f4b4945e549b83556678a873cd10f21d7304b1d3785
SHA512
26f95f60178d45cdf9c7ae8ec976e52925c4e5b50da32c3d28632177de812e581d1acf0bab8e26ac893040e582809555950d276e260974ddfccad44a58a6522d
SSDEEP
196608:6qfCZiqnwuRwNt1G96bCcxQ9Lfa35srxSBh4J4+OSVjGTBtqBOfArMg+mfPkKwI:9DKwn166DG9O3eU74J4+OoYCUAog+m0
resource | yara_rule |
---|---|
sample | vmprotect |
Checks for missing Authenticode signature.
resource |
---|
41c2fb72dc07d8880a886f4b4945e549b83556678a873cd10f21d7304b1d3785 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Direct3DCreate8
MapViewOfFile
UnmapViewOfFile
DisableThreadLibraryCalls
GetModuleFileNameW
CreateFileMappingA
K32GetModuleInformation
GetProcessHeap
HeapSetInformation
TerminateProcess
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceCounter
QueryPerformanceFrequency
K32EmptyWorkingSet
K32GetProcessMemoryInfo
DuplicateHandle
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentDirectoryW
GetCurrentThread
GetCurrentThreadId
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualFree
SetLastError
FreeLibrary
GetModuleHandleW
LoadLibraryExW
WriteFile
CreateFileW
CreateThread
IsProcessorFeaturePresent
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
CloseHandle
OutputDebugStringW
HeapReAlloc
HeapAlloc
HeapFree
ExitProcess
ReadFile
WriteConsoleW
GetModuleHandleExW
GetFileType
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedFlushSList
RtlUnwind
RaiseException
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetCPInfo
LCMapStringEx
DecodePointer
EncodePointer
CreateFileA
GetCommandLineA
GetTickCount64
WritePrivateProfileStringA
GetModuleFileNameA
GetCurrentProcess
Sleep
LoadLibraryA
SetEndOfFile
VirtualQuery
VirtualProtect
VirtualAlloc
GetProcAddress
GetModuleHandleA
GetSystemTimeAsFileTime
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
GetFileSizeEx
GetLastError
GetCurrentDirectoryA
HeapSize
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
LocalFree
FormatMessageA
GetLocaleInfoEx
GetStringTypeW
FindClose
FindFirstFileExW
FindNextFileW
AreFileApisANSI
MoveFileExW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
FlushFileBuffers
GetVersionExA
VirtualQuery
GetSystemTimeAsFileTime
GetModuleHandleA
CreateEventA
GetModuleFileNameW
LoadLibraryA
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
GetCurrentThreadId
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
WriteProcessMemory
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
GetProcessAffinityMask
SetProcessAffinityMask
GetCurrentThread
SetThreadAffinityMask
Sleep
FreeLibrary
GetTickCount
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFree
LocalAlloc
LocalFree
GetProcAddress
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleW
LoadResource
MultiByteToWideChar
FindResourceExW
FindResourceExA
WideCharToMultiByte
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
CreateFileW
LoadLibraryW
GetLastError
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
HeapReAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
SetStdHandle
MessageBoxA
LoadCursorA
ScreenToClient
ClientToScreen
SetCursor
SetCursorPos
GetCapture
IsChild
TrackMouseEvent
EmptyClipboard
GetClipboardData
SetClipboardData
CloseClipboard
OpenClipboard
GetCursorPos
GetClientRect
GetForegroundWindow
ReleaseCapture
SetCapture
GetAsyncKeyState
GetDesktopWindow
UpdateWindow
SetLayeredWindowAttributes
DestroyWindow
PostQuitMessage
PeekMessageA
SetWindowLongA
GetWindowRect
GetWindowLongA
EndPaint
BeginPaint
DrawTextA
GetSystemMetrics
GetDlgItem
SetWindowPos
ShowWindow
CreateWindowExA
UnregisterClassA
RegisterClassA
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
GetProcessWindowStation
GetUserObjectInformationW
CharUpperBuffW
MessageBoxW
CreateSolidBrush
SelectObject
SetBkMode
CreateFontA
RegCloseKey
RegOpenKeyExA
RegSetValueExW
RegQueryValueExA
RegOpenKeyA
ShellExecuteA
InternetQueryDataAvailable
InternetOpenA
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
WTSSendMessageW
ijlErrorStr
ijlFree
ijlGetLibVersion
ijlInit
ijlRead
ijlWrite
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE