DllInit
DllInstall
Static task
static1
Behavioral task
behavioral1
Sample
390f23809da096d01d332a312a6e319b.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
390f23809da096d01d332a312a6e319b.dll
Resource
win10v2004-20231215-en
Target
390f23809da096d01d332a312a6e319b
Size
76KB
MD5
390f23809da096d01d332a312a6e319b
SHA1
9ba845f62870d17a28d9eee9e7e83a55e095e6ad
SHA256
e42a3f2b7ceb0e968006cf067dfd2a041f60634b0b9350ecee64c0b2b7dd1490
SHA512
54104dea825572fa280c09718b388ea1a1a52f1d300922943b7766e8e00534d194da6e68d368d84fd50c3e30a7eb2ffa5b6c8df78baecfa611bd682012c871f3
SSDEEP
1536:+9U+iskEGeL7caDs+KEdWkpQDweKgknxxyhJLV92fJx7L:EVke3NQXkpQs/xChJD2T7L
Checks for missing Authenticode signature.
resource |
---|
390f23809da096d01d332a312a6e319b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
LoadLibraryA
CreateProcessA
VirtualProtect
lstrcatW
MoveFileExA
InitializeCriticalSection
CreateFileMappingA
LeaveCriticalSection
MapViewOfFile
WaitForSingleObject
lstrcpyW
CreateMutexA
CloseHandle
GetProcAddress
ReleaseMutex
CreateThread
GetProcessHeap
GetComputerNameA
HeapValidate
InterlockedExchange
EnterCriticalSection
CopyFileA
lstrlenA
WaitNamedPipeA
SizeofResource
OpenThread
GetFileAttributesExA
UpdateResourceA
AreFileApisANSI
MoveFileExW
LCMapStringA
QueueUserAPC
VirtualUnlock
ReadFile
WriteConsoleA
GetUserDefaultLCID
ResumeThread
WriteFile
SwitchToThread
GetTickCount
GetTimeFormatW
FillConsoleOutputAttribute
GetCPInfo
DuplicateHandle
SetComputerNameA
AllocConsole
SetEvent
GetVolumeNameForVolumeMountPointW
GetSystemTime
FindClose
GetVersionExA
LocalAlloc
GetCurrentDirectoryA
lstrcmpA
GetStdHandle
CreateMailslotA
ReplaceFileW
FormatMessageA
FormatMessageW
FindVolumeMountPointClose
GetLargestConsoleWindowSize
EscapeCommFunction
FileTimeToLocalFileTime
WaitForMultipleObjects
UnregisterWaitEx
GetWindowsDirectoryA
EnumSystemLocalesA
GetBinaryTypeA
WriteProfileStringA
GetCurrentDirectoryW
ReleaseSemaphore
EnumResourceLanguagesA
GetStringTypeExA
GetVolumePathNamesForVolumeNameW
MultiByteToWideChar
SetFileAttributesA
TransactNamedPipe
SetVolumeLabelA
FindNextVolumeW
GetThreadContext
PeekConsoleInputW
ConnectNamedPipe
CreateSemaphoreA
InterlockedExchangeAdd
GetEnvironmentVariableA
GetProfileStringW
FreeResource
LoadResource
GetTempPathW
LocalSize
SuspendThread
GetExitCodeProcess
LockResource
GetDefaultCommConfigW
LocalUnlock
GlobalGetAtomNameW
GetDiskFreeSpaceA
SetEnvironmentVariableW
WinExec
SetVolumeLabelW
VerLanguageNameW
GetStringTypeExW
GetHandleInformation
WaitNamedPipeW
RtlMoveMemory
GetTimeFormatA
SetTimeZoneInformation
ReadFileEx
GetFileInformationByHandle
LocalHandle
WaitForSingleObjectEx
lstrcmpW
LocalFlags
HeapSetInformation
FindVolumeClose
DeleteFileA
GetThreadPriority
Beep
InterlockedDecrement
TerminateJobObject
PulseEvent
OpenFileMappingA
SetConsoleScreenBufferSize
Sleep
UnlockFileEx
GetVolumeInformationA
GetFileAttributesA
GetComputerNameW
CreateTimerQueue
FindNextFileA
FreeConsole
GetModuleHandleW
lstrcatA
GetCommandLineA
UnlockFile
SetSystemTime
WriteProfileStringW
FindNextFileW
GetVersion
SetConsoleTextAttribute
HeapDestroy
GlobalMemoryStatusEx
GetFileType
IsProcessorFeaturePresent
FindFirstVolumeW
SetCurrentDirectoryW
FindResourceExA
ReadProcessMemory
GetUserDefaultLangID
GetLongPathNameW
GetFileSizeEx
SetErrorMode
GetProfileIntA
GetCurrentProcess
BindIoCompletionCallback
GetLocaleInfoA
CoFreeUnusedLibrariesEx
CoDisableCallCancellation
OleCreateLinkFromData
CoGetClassObject
RegisterDragDrop
CreateGenericComposite
OleTranslateAccelerator
CoGetMalloc
CoImpersonateClient
CoCreateInstanceEx
CreateILockBytesOnHGlobal
GetRunningObjectTable
StringFromGUID2
CoMarshalInterface
CoWaitForMultipleHandles
CoSetProxyBlanket
GetHGlobalFromStream
CoGetInterfaceAndReleaseStream
OleDestroyMenuDescriptor
OleRegGetUserType
MkParseDisplayName
CoGetCallContext
StgIsStorageILockBytes
ReadFmtUserTypeStg
CreatePointerMoniker
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
CoAllowSetForegroundWindow
CoUninitialize
SHFileOperationA
SHGetPathFromIDListA
SHGetSpecialFolderPathW
SHGetInstanceExplorer
SHGetDesktopFolder
SHGetSpecialFolderPathA
ShellAboutW
DragQueryFileA
SHGetFileInfoW
SHFormatDrive
SHGetMalloc
SHGetPathFromIDListW
SHGetFolderPathA
ShellExecuteExW
DllInit
DllInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ