ASet
BeginTransaction
DupCursor
HrGetBodyElement
PszFromANSIStreamA
PszSkipWhiteW
ReplaceChars
UpdateTexturePriority
Static task
static1
Behavioral task
behavioral1
Sample
6c9c0669a9802448565e58360541cc53.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6c9c0669a9802448565e58360541cc53.dll
Resource
win10v2004-20231215-en
Target
6c9c0669a9802448565e58360541cc53
Size
175KB
MD5
6c9c0669a9802448565e58360541cc53
SHA1
b64e4e0e9dd351a805241a2cb99df263313179a8
SHA256
3e853fdcd72946b9e4a1fe0eb269513fe6745c2316dedd75ea2a5db179789862
SHA512
26ac1eef94b995588b09f9005bf4628953c573255572656f0bbf849ba61c3f823c959fe7ef2f064dc1b8bd9e3d7649a78889657de81fd0ffd484b5f03615afe7
SSDEEP
3072:or3aGpikoMDAHnjU8gNPMDeejx+Hn86Otx6HMKDz+H24IyOpwzox3C5J30t:LSiJMMHnjU8ggx+HR6x65z824IHwEx3L
Checks for missing Authenticode signature.
resource |
---|
6c9c0669a9802448565e58360541cc53 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PolyDraw
ArcTo
GetModuleHandleA
GetProcAddress
InterlockedExchange
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
GetCurrentProcessId
VirtualFree
VirtualProtect
lstrlenW
ExitProcess
FindFirstFileW
FindNextFileW
VirtualAlloc
_initterm
_ismbblead
_wcsdup
_wcslwr
exit
free
memset
printf
wcsstr
wprintf
_exit
_controlfp
_cexit
__setusermatherr
__set_app_type
__p__fmode
__p__commode
__getmainargs
_XcptFilter
_amsg_exit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SHGetSpecialFolderLocation
CommandLineToArgvW
SHCreateDirectoryExW
IsWindow
ASet
BeginTransaction
DupCursor
HrGetBodyElement
PszFromANSIStreamA
PszSkipWhiteW
ReplaceChars
UpdateTexturePriority
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ