DllEntry
Init
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
c45446c6342eb94dfeadce85e45a710f0c12d6d9c7f2fb55fc7b2535ef59c886.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c45446c6342eb94dfeadce85e45a710f0c12d6d9c7f2fb55fc7b2535ef59c886.dll
Resource
win10v2004-20230915-en
Target
c45446c6342eb94dfeadce85e45a710f0c12d6d9c7f2fb55fc7b2535ef59c886
Size
1.1MB
MD5
b296e88d305e927e3a939450443b48e5
SHA1
4faf131d81d82b9d034d9ef42e0271ff204cfc15
SHA256
c45446c6342eb94dfeadce85e45a710f0c12d6d9c7f2fb55fc7b2535ef59c886
SHA512
5363aa4f6e58f09e8b940ab1e10227546acc4b09ead1cfacd9feeb1128a7e6fe0423fce4bcdd3feac5e51428bf2875e7ec0f09345ce52a12c287111fb4527bfa
SSDEEP
24576:rEJBzt1B58u31fc53n6M/oNyijFZuI5E3o9PS3myXdIBX:kr1D8uFex/2VadWX
Checks for missing Authenticode signature.
resource |
---|
c45446c6342eb94dfeadce85e45a710f0c12d6d9c7f2fb55fc7b2535ef59c886 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadResource
FindResourceW
FindResourceExW
WideCharToMultiByte
LocalAlloc
LocalFree
CreateFileW
DeviceIoControl
WriteFile
CreateHardLinkW
DeleteFileW
QueryPerformanceCounter
GetTickCount
CreateDirectoryW
LoadLibraryW
GetProcessId
VirtualAllocEx
WriteProcessMemory
VirtualQuery
ProcessIdToSessionId
TerminateProcess
GetCurrentThreadId
LoadLibraryA
GetVersionExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
LockResource
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SizeofResource
WaitForSingleObject
CreateThread
Sleep
ExitProcess
GetModuleFileNameW
SetUnhandledExceptionFilter
MultiByteToWideChar
SubmitThreadpoolWork
CreateThreadpoolWork
SetThreadpoolThreadMinimum
SetThreadpoolThreadMaximum
CreateThreadpool
GetCurrentProcess
OpenMutexW
GetLastError
CreateMutexW
FlushFileBuffers
SetStdHandle
HeapCreate
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
Process32NextW
Process32FirstW
GetConsoleMode
GetConsoleCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InterlockedDecrement
SetLastError
InterlockedIncrement
TlsFree
CreateToolhelp32Snapshot
GetModuleHandleW
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
GetProcAddress
OpenProcess
CloseHandle
ReadFile
SetFilePointer
GetSystemInfo
GetModuleHandleA
VirtualFree
TerminateThread
VirtualAlloc
CreateRemoteThread
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
GlobalAlloc
GlobalFree
CreateFileA
GetThreadDesktop
wsprintfW
FindWindowW
OpenDesktopW
SetThreadDesktop
FindWindowExW
GetWindowThreadProcessId
GetTokenInformation
LookupPrivilegeValueW
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerW
OpenSCManagerW
CreateServiceW
StartServiceW
CloseServiceHandle
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
OpenProcessToken
PathFileExistsW
StrCmpIW
GetModuleFileNameExW
FwpmFilterEnum0
FwpmEngineClose0
FwpmEngineOpen0
FwpmFilterCreateEnumHandle0
FwpmFilterDestroyEnumHandle0
FwpmFilterDeleteById0
FwpmFreeMemory0
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
CryptMsgGetParam
CertFindCertificateInStore
CertGetNameStringW
CryptQueryObject
InternetOpenUrlW
InternetCloseHandle
InternetReadFile
HttpSendRequestW
InternetSetOptionW
InternetQueryOptionW
InternetSetOptionA
HttpOpenRequestW
InternetConnectW
InternetOpenW
DnsFree
DnsQuery_W
inet_addr
inet_ntoa
ntohl
htonl
SendARP
GetIpNetTable
GetAdaptersInfo
DllEntry
Init
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ