DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c15b182a6983b43caa6d1aefcf34c783a007adc612bcf8f180c36d136274b56b.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c15b182a6983b43caa6d1aefcf34c783a007adc612bcf8f180c36d136274b56b.dll
Resource
win10v2004-20231020-en
Target
c15b182a6983b43caa6d1aefcf34c783a007adc612bcf8f180c36d136274b56b
Size
868KB
MD5
6a6df42d9a0d2ee56c07a3af7b0819c4
SHA1
0d736087d1c922da76c553221b93e2a8e6fe8451
SHA256
c15b182a6983b43caa6d1aefcf34c783a007adc612bcf8f180c36d136274b56b
SHA512
cafc068bd131b72b2a7e6135473713cc6888f85967a557e90571c4bc8cf8222ebd78bb3c1a3a9b29f46bb891beac81e11e014582f6e6360a1a9eaaf906ec2761
SSDEEP
24576:i91AUHUWEOgWyJnAXpLc/pOm6iEOa4Zo0yoFDD:UU3OKnAXJcYziEkoDyDD
Checks for missing Authenticode signature.
resource |
---|
c15b182a6983b43caa6d1aefcf34c783a007adc612bcf8f180c36d136274b56b |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetLastError
Sleep
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetSystemInfo
GetModuleHandleW
GetVersionExW
CreateThread
GetPrivateProfileStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
SizeofResource
lstrcmpiW
LoadLibraryExW
GetModuleFileNameA
FindResourceW
GetPrivateProfileIntW
WritePrivateProfileStringW
EncodePointer
DecodePointer
GetThreadLocale
SetThreadLocale
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameW
GetCurrentProcessId
FindNextFileW
FindFirstFileW
CreateFileW
CloseHandle
FindClose
ReadFile
FreeLibrary
WriteFile
LoadLibraryW
GetCurrentProcess
GetProcAddress
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetACP
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
GetModuleHandleExW
ExitProcess
InterlockedFlushSList
RtlUnwindEx
RtlPcToFileHeader
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetStringTypeW
LCMapStringW
CompareStringW
IsDebuggerPresent
OutputDebugStringW
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CharNextW
LoadStringW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
LookupAccountSidW
GetTokenInformation
OpenProcessToken
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
SysFreeString
SysStringLen
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
SysAllocString
RegisterTypeLi
UnRegisterTypeLi
StrStrIA
PathFileExistsW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ