DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RouteTheCall
Static task
static1
Behavioral task
behavioral1
Sample
a76a33141555b2da9b74965ff6a1f923cd6ff4f47491698a7fffb2d5a12db353.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a76a33141555b2da9b74965ff6a1f923cd6ff4f47491698a7fffb2d5a12db353.dll
Resource
win10v2004-20231023-en
Target
a76a33141555b2da9b74965ff6a1f923cd6ff4f47491698a7fffb2d5a12db353
Size
1.2MB
MD5
266779b47dde8cb04ddfd222d7722d61
SHA1
48b3cf1b1b9bd6aa9bfecd0c01ef2b61d2261e20
SHA256
a76a33141555b2da9b74965ff6a1f923cd6ff4f47491698a7fffb2d5a12db353
SHA512
9f4d69aaaa8f4f2d35d10d31c10c3d61c9277c391e445cc1414e81c0c906cdeeb261bd96c79c2f69bca5359a26aadf080e042313d8da98005a9d6466905bf4d5
SSDEEP
12288:CTmZoFqsSwqcKZxmclTE9GyHamursbyZ+E4xkWOZ+ntDfJaTxTEzlzRp4ONRyIUs:CT4o+v44olxkWOInL
Checks for missing Authenticode signature.
resource |
---|
a76a33141555b2da9b74965ff6a1f923cd6ff4f47491698a7fffb2d5a12db353 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegOpenKeyW
RegSetValueExW
CreatePropertySheetPageW
PropertySheetW
CloseHandle
CreateFileA
CreateFileW
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileW
DisableThreadLibraryCalls
DosDateTimeToFileTime
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FindResourceW
FlushInstructionCache
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileTime
GetFullPathNameW
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockResource
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReleaseSemaphore
SetFilePointer
SetFileTime
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpiW
lstrlenA
lstrlenW
__dllonexit
_amsg_exit
_beginthreadex
_initterm
_iob
_lock
_memicmp
_onexit
_unlock
_vscwprintf
_vsnwprintf
_wcsicmp
_wcsnicmp
abort
calloc
free
fwrite
iswspace
malloc
memcmp
memcpy
memmove
memset
rand
realloc
sprintf
srand
strchr
strcmp
strncmp
strrchr
time
vfprintf
vsprintf
vswprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsstr
wcstol
wcstoul
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
ProgIDFromCLSID
ReleaseStgMedium
StringFromGUID2
SysAllocStringLen
SysFreeString
CDefFolderMenu_Create2
ord83
DragQueryFileW
ILClone
ILCombine
ILGetNext
SHAlloc
SHBrowseForFolderW
SHChangeNotify
SHCreateFileExtractIconW
SHCreateShellFolderView
SHGetFileInfoW
SHGetFolderPathW
SHGetPathFromIDListW
SHParseDisplayName
SHPathPrepareForWriteW
ShellExecuteW
PathAddBackslashW
PathAppendW
PathCompactPathW
PathFileExistsW
PathFindFileNameW
PathIsDirectoryW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecW
PathStripPathW
SHGetValueW
SHRegGetValueW
SHStrDupW
StrCpyNW
StrFormatByteSizeW
CharLowerBuffW
CharUpperBuffW
CheckDlgButton
DialogBoxParamW
EnableWindow
EndDialog
GetDC
GetDesktopWindow
GetDlgItem
GetDlgItemTextA
GetMonitorInfoW
GetParent
GetWindowLongW
GetWindowRect
GetWindowTextLengthA
GetWindowTextLengthW
GetWindowTextW
InsertMenuW
IsDlgButtonChecked
LoadIconW
LoadStringW
MessageBoxW
MonitorFromWindow
MoveWindow
PostMessageW
ReleaseDC
SendDlgItemMessageW
SendMessageCallbackW
SendMessageW
SetDlgItemTextW
SetWindowLongW
ShowWindow
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RouteTheCall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ