DllRegisterServer
GetStatus
entedaq
jchwswmiyacvsxwpe
sadetcblx
xqifhvaoamfqnj
yynkewabffe
zjilrzzpefoaw
zrboblfnjb
Static task
static1
Behavioral task
behavioral1
Sample
6e2316bb2c6cb9c5e3c26398574e5548.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6e2316bb2c6cb9c5e3c26398574e5548.dll
Resource
win10v2004-20231215-en
Target
6e2316bb2c6cb9c5e3c26398574e5548
Size
512KB
MD5
6e2316bb2c6cb9c5e3c26398574e5548
SHA1
81be2c346afec4bc248f6332bcb287b3bb6ea547
SHA256
016a36baa939016b069f379a632769eca6e77639543283583b1d5b675065279f
SHA512
c8efe49ab78db3f9e7e246ecd3624d91d16f076409414181a006e336640fc9b388acc8252a462241ca52afd6bc8265036fb40eff8e631c2f347af2389b821455
SSDEEP
6144:h8Hn6uhrFveAYc4653HZBM+knvzHHAg7Toh0QFFo3JpWPwM6mRolwzpSjeIUOe+N:h8BvjYc4cJCbHHZojuvXjZDeXGyK
Checks for missing Authenticode signature.
Processes:
resource |
---|
6e2316bb2c6cb9c5e3c26398574e5548 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhCloseQuery
PdhRemoveCounter
PdhAddCounterW
PdhValidatePathW
PdhOpenQueryW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
MulDiv
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
SetLastError
DeleteCriticalSection
InitializeCriticalSectionEx
DecodePointer
DisableThreadLibraryCalls
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetLastError
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
RaiseException
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
MultiByteToWideChar
CloseHandle
ReadFile
FindClose
SetStdHandle
CreateFileW
WriteConsoleW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
RtlUnwind
GetModuleHandleExW
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
FreeEnvironmentStringsW
TlsAlloc
InitializeCriticalSectionAndSpinCount
InterlockedFlushSList
RtlPcToFileHeader
RtlUnwindEx
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
EncodePointer
HeapAlloc
HeapFree
GetProcessHeap
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
VirtualAlloc
VirtualFree
LoadLibraryExA
WideCharToMultiByte
LocalFree
LCMapStringEx
GetStringTypeW
DefWindowProcW
CharNextW
IsWindow
CallWindowProcW
GetWindowLongPtrW
SetWindowLongPtrW
CreateWindowExW
LoadCursorW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
SetTimer
ReleaseDC
GetDC
EndPaint
ClientToScreen
SendMessageW
GetParent
BeginPaint
DrawTextW
InvalidateRect
InsertMenuW
GetClientRect
DestroyWindow
ShowWindow
DeleteDC
BitBlt
SetBkMode
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
SelectObject
SetTextColor
GetDeviceCaps
CreateFontW
GetTextMetricsW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
ShellExecuteW
SHGetFolderPathW
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
OleRun
CoCreateInstance
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
VarBstrCmp
VariantChangeType
VariantClear
VariantCopy
VariantInit
SysFreeString
SysAllocString
SysStringLen
DllRegisterServer
GetStatus
entedaq
jchwswmiyacvsxwpe
sadetcblx
xqifhvaoamfqnj
yynkewabffe
zjilrzzpefoaw
zrboblfnjb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ