ExportFunc
ExportFunc2
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
37f284de8746288a69f90a4407850564.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37f284de8746288a69f90a4407850564.dll
Resource
win10v2004-20231215-en
Target
37f284de8746288a69f90a4407850564
Size
212KB
MD5
37f284de8746288a69f90a4407850564
SHA1
2de2186a0fc263ddf79198b4d8850eff8747bc41
SHA256
c1880dea8f41b0badac4b887775fd2b5f506d6e694684d69dd616c12be468d7c
SHA512
486ec170389c70d381a4097cd6f56029a680f4ee070b054a4b0f97b60bea6e8ca184abd5726dc21cad98111f324b21f1a84c0ba7b850b2e211385b77bc5e9ada
SSDEEP
3072:TVEEHc18pjAuGaRdeMfh5NDWYxAIY7YRMuCIdxcqN3Gjq0hlF5VTgiY:yEHcGjAux5NRPRMVWcqND0vP
Checks for missing Authenticode signature.
resource |
---|
37f284de8746288a69f90a4407850564 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetProcAddress
LoadLibraryA
FreeLibrary
LocalFree
MapViewOfFile
UnmapViewOfFile
ExitProcess
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
MoveFileExA
lstrlenA
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
InterlockedDecrement
SystemTimeToFileTime
FindNextFileA
QueryPerformanceCounter
WriteFile
VirtualFree
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
InitializeCriticalSection
IsBadCodePtr
GetStringTypeW
GetStringTypeA
SetFileTime
FindFirstFileA
FindClose
DeleteFileA
CopyFileA
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetCurrentThreadId
GetLastError
GetTickCount
InterlockedExchange
DisableThreadLibraryCalls
FreeConsole
GetExitCodeThread
TerminateThread
SetLastError
GetModuleFileNameA
Sleep
ReleaseMutex
CreateMutexA
WaitForSingleObject
CloseHandle
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
HeapCreate
GetCPInfo
GetOEMCP
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
IsBadWritePtr
GetTimeZoneInformation
SetFilePointer
ReadFile
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
ExitThread
CreateThread
RaiseException
RtlUnwind
GetCommandLineA
IsBadReadPtr
GetModuleHandleA
TerminateProcess
GetFileAttributesA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetCurrentProcessId
TranslateMessage
DispatchMessageA
GetMessageA
SetWindowTextA
SetTimer
PostMessageA
MessageBoxA
FindWindowA
SetWindowPos
SystemParametersInfoA
EnumChildWindows
GetWindowThreadProcessId
PostThreadMessageA
KillTimer
EnumWindows
GetClassNameA
RegisterServiceCtrlHandlerA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
RegCreateKeyExA
ControlService
QueryServiceStatus
OpenServiceA
DeleteService
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegCreateKeyA
SetServiceStatus
ShellExecuteA
SHGetFolderPathA
CoCreateInstance
CoCreateGuid
CoInitializeEx
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
VariantInit
Netbios
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
GetProfilesDirectoryA
CreateURLMoniker
ExportFunc
ExportFunc2
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ