DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
bda8a1e87b2f634ed4172e148acfb20a1bafcca2fc5908a0cb46c1c5ac20804e.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
bda8a1e87b2f634ed4172e148acfb20a1bafcca2fc5908a0cb46c1c5ac20804e.dll
Resource
win10v2004-20231023-en
Target
bda8a1e87b2f634ed4172e148acfb20a1bafcca2fc5908a0cb46c1c5ac20804e
Size
527KB
MD5
3bb3f1c7a358e0f9302b6a39a9dbd49d
SHA1
11f2ba626579a0e79b2d87b9567318c5e4eb0009
SHA256
bda8a1e87b2f634ed4172e148acfb20a1bafcca2fc5908a0cb46c1c5ac20804e
SHA512
0bfbc58c4ca84838ba71580b7112bb91d0bb7367aa174f3fddac6a8352fcc252634dab154c092b8773259c2d2c53aa478d305b12029f957f48c6fbcd599bd17b
SSDEEP
12288:uSDMtuvuo5u9vi73lcz4MXFaitSuzBd3X3uwy:1Dl3mi24MXQitSMBd3X37y
Checks for missing Authenticode signature.
resource |
---|
bda8a1e87b2f634ed4172e148acfb20a1bafcca2fc5908a0cb46c1c5ac20804e |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExpandEnvironmentStringsW
GetCurrentProcess
Sleep
SetThreadExecutionState
GetSystemDirectoryW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
LocalFileTimeToFileTime
TzSpecificLocalTimeToSystemTime
GetSystemTime
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
GetCPInfo
IsDBCSLeadByte
GetLocaleInfoW
GetNumberFormatW
GetTempPathW
GetTimeFormatW
GetDateFormatW
WaitForSingleObject
DecodePointer
WriteConsoleW
HeapSize
GetStringTypeW
SetStdHandle
GetProcessHeap
LCMapStringW
FreeEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
GetFileSizeEx
HeapReAlloc
HeapAlloc
HeapFree
ExitProcess
QueryPerformanceFrequency
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
InterlockedFlushSList
RaiseException
RtlUnwind
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
FindResourceW
GetCurrentDirectoryW
GetModuleFileNameW
GetModuleHandleExW
FoldStringW
ReadFile
GetVersionExW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
GetCurrentProcessId
SetFileAttributesW
GetFileAttributesW
GetDiskFreeSpaceExW
LoadLibraryExW
GetDriveTypeW
CreateDirectoryW
GetFileType
GetFileTime
FlushFileBuffers
GetStdHandle
SetLastError
FreeLibrary
GetFileSize
GetProcAddress
LoadLibraryW
CloseHandle
GetLastError
CreateFileW
SetEndOfFile
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LocalFree
SetFilePointer
SetFileTime
WriteFile
GetEnvironmentStringsW
ShowWindow
GetParent
SendMessageW
GetDC
SetDlgItemTextW
GetDlgItem
InvalidateRect
SetWindowTextW
ReleaseDC
MonitorFromPoint
InsertMenuItemW
DestroyWindow
EqualRect
CreatePopupMenu
GetMonitorInfoW
SendDlgItemMessageW
GetSysColor
AppendMenuW
LoadImageW
GetCursorPos
BeginPaint
EndPaint
CopyImage
EnumDisplayMonitors
CreateWindowExW
MapWindowPoints
LoadCursorW
SetCursor
CharUpperW
CharLowerW
OemToCharBuffA
LoadStringW
SetWindowLongW
SetMenuItemInfoW
GetClassNameW
GetWindow
GetSystemMetrics
SetWindowPos
GetWindowLongW
GetClientRect
GetWindowRect
OemToCharA
SetPixel
GetPixel
CreateCompatibleBitmap
CreateDIBSection
CreateCompatibleDC
StretchBlt
GetDeviceCaps
DeleteDC
GetObjectW
TextOutW
SetTextColor
DeleteObject
MoveToEx
CreatePen
CreateFontW
GetTextMetricsW
GetTextFaceW
SelectObject
LineTo
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
ShellExecuteExW
DragQueryFileW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListW
CoSetProxyBlanket
CoCreateInstance
ReleaseStgMedium
CoTaskMemFree
CoCreateFreeThreadedMarshaler
SysFreeString
SysAllocString
VariantClear
SHStrDupW
ord8
DestroyPropertySheetPage
CreatePropertySheetPageW
GradientFill
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ