NP_GetEntryPoints
NP_GetMIMEDescription
NP_Initialize
NP_Shutdown
Static task
static1
Behavioral task
behavioral1
Sample
fa5533289b8547c05a8998b95bba4fd8.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fa5533289b8547c05a8998b95bba4fd8.dll
Resource
win10v2004-20231215-en
Target
fa5533289b8547c05a8998b95bba4fd8
Size
84KB
MD5
fa5533289b8547c05a8998b95bba4fd8
SHA1
cf0dd63fb4ae67897d7392ba5160abd4a713ea62
SHA256
3a2d4fbbd8a30ae7b4f07efe71a2358ad508867d82afd4d4b88ca0820539e932
SHA512
5a4007ddafbff23109cfe12ba23b741fb0b03b131db87bf64c4ee991b9a6263017c0bce1be05bfbe9ddd62f4dfabed326adeb925a819aa34f4493e9578e0b859
SSDEEP
1536:LI+oksjDUXtgwuupcHx6w8O7JY0Y8BnP1N5dc2Cn:LI+okvtghsMJBP1N5dc2C
Checks for missing Authenticode signature.
resource |
---|
fa5533289b8547c05a8998b95bba4fd8 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
StrStrIA
wnsprintfA
HttpQueryInfoA
HttpOpenRequestA
InternetGetConnectedState
HttpSendRequestA
InternetCrackUrlA
GetCurrentProcess
HeapFree
WaitForSingleObject
GetProcessHeap
WriteFile
TerminateThread
Sleep
CreateProcessA
GetLastError
GetProcAddress
LoadLibraryA
HeapAlloc
ReleaseMutex
CloseHandle
GetTempPathA
LocalFree
CreateThread
GetVolumeInformationA
SetLastError
lstrcpyA
GetSystemTimeAsFileTime
FreeLibrary
lstrlenA
CreateFileA
HeapReAlloc
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
CreateMutexA
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
HeapSize
GetConsoleMode
GetConsoleCP
SetFilePointer
GetCurrentThreadId
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
RaiseException
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetModuleHandleA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
GetLengthSid
DuplicateTokenEx
ConvertStringSidToSidW
SetTokenInformation
OpenProcessToken
RegOpenKeyA
ShellExecuteA
NP_GetEntryPoints
NP_GetMIMEDescription
NP_Initialize
NP_Shutdown
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ