DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb.dll
Resource
win10v2004-20231127-en
Target
2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb
Size
528KB
MD5
630dab086fa642da8386a42b53c9f0dd
SHA1
8c7ffa90594eb7167388ce7f117d22070e23938a
SHA256
2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb
SHA512
a837555babed9188280080ba8907dd2ee75dac87603fcd733e8f79ef799d29e24c5d616324d598e3c0be6b72d5c93e428ee2bf7b68b09cb9022c1e16959e83c6
SSDEEP
12288:9sGD8tu/sI5uk249x4C6cBJ5c4zBd3X3u8g:93DVNT249jBJRzBd3X3I
Checks for missing Authenticode signature.
resource |
---|
2de1e95b1015aa6f2827cb4f5a46c7efb42395712c236b9cebca70550b29e5eb |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExpandEnvironmentStringsW
GetCurrentProcess
Sleep
SetThreadExecutionState
GetSystemDirectoryW
FileTimeToLocalFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
LocalFileTimeToFileTime
TzSpecificLocalTimeToSystemTime
GetSystemTime
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
GetCPInfo
IsDBCSLeadByte
GetLocaleInfoW
GetNumberFormatW
GetTempPathW
GetTimeFormatW
GetDateFormatW
WaitForSingleObject
DecodePointer
WriteConsoleW
HeapSize
GetStringTypeW
SetStdHandle
GetProcessHeap
LCMapStringW
FreeEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
GetFileSizeEx
HeapReAlloc
HeapAlloc
HeapFree
ExitProcess
QueryPerformanceFrequency
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
InterlockedFlushSList
RaiseException
RtlUnwind
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
FindResourceW
GetCurrentDirectoryW
GetModuleFileNameW
GetModuleHandleExW
FoldStringW
ReadFile
GetVersionExW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
GetCurrentProcessId
SetFileAttributesW
GetFileAttributesW
GetDiskFreeSpaceExW
LoadLibraryExW
GetDriveTypeW
CreateDirectoryW
GetFileType
GetFileTime
FlushFileBuffers
GetStdHandle
SetLastError
FreeLibrary
GetFileSize
GetProcAddress
LoadLibraryW
CloseHandle
GetLastError
CreateFileW
SetEndOfFile
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LocalFree
SetFilePointer
SetFileTime
WriteFile
GetEnvironmentStringsW
ShowWindow
GetParent
SendMessageW
GetDC
SetDlgItemTextW
GetDlgItem
InvalidateRect
SetWindowTextW
ReleaseDC
MonitorFromPoint
InsertMenuItemW
DestroyWindow
EqualRect
CreatePopupMenu
GetMonitorInfoW
SendDlgItemMessageW
GetSysColor
AppendMenuW
LoadImageW
GetCursorPos
BeginPaint
EndPaint
CopyImage
EnumDisplayMonitors
CreateWindowExW
MapWindowPoints
LoadCursorW
SetCursor
CharUpperW
CharLowerW
OemToCharBuffA
LoadStringW
SetWindowLongW
SetMenuItemInfoW
GetClassNameW
GetWindow
GetSystemMetrics
SetWindowPos
GetWindowLongW
GetClientRect
GetWindowRect
OemToCharA
SetPixel
GetPixel
CreateCompatibleBitmap
CreateDIBSection
CreateCompatibleDC
StretchBlt
GetDeviceCaps
DeleteDC
GetObjectW
TextOutW
SetTextColor
DeleteObject
MoveToEx
CreatePen
CreateFontW
GetTextMetricsW
GetTextFaceW
SelectObject
LineTo
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
ShellExecuteExW
DragQueryFileW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListW
CoSetProxyBlanket
CoCreateInstance
ReleaseStgMedium
CoTaskMemFree
CoCreateFreeThreadedMarshaler
SysFreeString
SysAllocString
VariantClear
SHStrDupW
ord8
DestroyPropertySheetPage
CreatePropertySheetPageW
GradientFill
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ