DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
1abf6bca5c840664c00ac8ee8e333e2d41319e3b2c231ea29f8bad2d7ef22ae4.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1abf6bca5c840664c00ac8ee8e333e2d41319e3b2c231ea29f8bad2d7ef22ae4.dll
Resource
win10v2004-20231023-en
Target
1abf6bca5c840664c00ac8ee8e333e2d41319e3b2c231ea29f8bad2d7ef22ae4
Size
140KB
MD5
a61024e92e04207b49098712354e72f3
SHA1
6d61befaf91eea1e643de11e89854fc727397d24
SHA256
1abf6bca5c840664c00ac8ee8e333e2d41319e3b2c231ea29f8bad2d7ef22ae4
SHA512
d14b00a1eb3bbc71dd7514e8fb2eede0123799ff44a92ea6822772306df3f225cd9d46c401948645742eb9be2ad87689ba419d7a06047be3f6b317d94ec080a3
SSDEEP
3072:LB6dAOOEwTCSHCuxVwg00zMODPPOAVP5Hvh:La+EwWSiWF00zR1P3
Checks for missing Authenticode signature.
resource |
---|
1abf6bca5c840664c00ac8ee8e333e2d41319e3b2c231ea29f8bad2d7ef22ae4 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
WindowsStringHasEmbeddedNull
WindowsIsStringEmpty
WindowsGetStringRawBuffer
RoOriginateError
RoOriginateErrorW
ShellExecuteExW
SHGetStockIconInfo
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SHStrDupW
CoTaskMemFree
CoTaskMemAlloc
GetConsoleMode
CreateFileW
CloseHandle
WriteConsoleW
SetFilePointerEx
FreeLibrary
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
InitOnceExecuteOnce
EncodePointer
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockShared
DecodePointer
AcquireSRWLockShared
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
HeapSize
RtlUnwindEx
InterlockedFlushSList
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetProcAddress
LoadLibraryExW
GetCurrentProcess
TerminateProcess
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ