DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5.dll
Resource
win10v2004-20230915-en
Target
a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5
Size
196KB
MD5
7c04af6b1b565060a7c4ce192cb6966d
SHA1
b331448dfee7d5e3507f0051fc603f3ab1787bb7
SHA256
a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5
SHA512
14af14288818cb45f98d4b4c3076b07b755b31998a844cc9af8f1552c4ac3c7c67e83fe1801027f50b163ff475c7cee273c6e1d1d46267ab54705480de25aef6
SSDEEP
6144:5Bz9Nt9vfbb9xVMgkzLXpItI3xiLiYCz:fpNt9v/9sgyaS3xiLiYCz
Checks for missing Authenticode signature.
resource |
---|
a23a61657075073d7df65fb81832d3bbd12c82eb36959d7b3197816e693e5fb5 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
GetWindowsDirectoryW
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
FreeLibrary
QueryFullProcessImageNameW
AllocConsole
VirtualQuery
LoadLibraryExW
WaitForMultipleObjects
WaitForSingleObject
WriteConsoleW
HeapSize
GetStringTypeW
FlushFileBuffers
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
LoadLibraryW
HeapReAlloc
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
SetEndOfFile
SetStdHandle
MultiByteToWideChar
GetConsoleMode
GetConsoleOutputCP
WriteFile
GetStdHandle
LCMapStringW
HeapFree
FreeConsole
CloseHandle
DisableThreadLibraryCalls
SetEvent
GetLastError
CreateEventW
OpenProcess
GetSystemDirectoryW
CreateFileW
CompareStringOrdinal
GetModuleFileNameW
GetModuleHandleExW
SetLastError
HeapAlloc
ExitProcess
DecodePointer
GetFileType
RaiseException
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
VirtualProtect
ReadFile
FindClose
CreateDirectoryW
InterlockedFlushSList
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
GetParent
SystemParametersInfoW
RegisterWindowMessageW
GetAncestor
GetWindowTextW
InvalidateRect
SendMessageW
RedrawWindow
GetWindowLongW
GetMenuItemInfoW
GetClassWord
PostMessageW
FindWindowExW
GetWindowRect
GetPropW
GetMenuItemCount
CreateWindowExW
RemovePropW
TrackPopupMenu
SetMenuItemInfoW
EnumPropsA
MapWindowPoints
SendNotifyMessageW
SetPropW
FindWindowW
GetClassNameW
SetWindowLongW
GetSystemMetricsForDpi
RegDeleteKeyValueW
RegGetValueW
RegOpenKeyExW
CheckTokenMembership
RegNotifyChangeKeyValue
RegCloseKey
AllocateAndInitializeSid
RegQueryValueExW
RegCreateKeyExW
RegSetValueExW
FreeSid
SHGetFolderPathW
PathStripPathW
PathFileExistsW
SetWindowThemeAttribute
ord410
ord412
ord413
DwmExtendFrameIntoClientArea
DwmSetWindowAttribute
ImageDirectoryEntryToDataEx
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ