ExportFunc
ExportFunc2
ServiceMain
s
Static task
static1
Behavioral task
behavioral1
Sample
04571e6cdc6be2a9e5d63bca0e623758.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04571e6cdc6be2a9e5d63bca0e623758.dll
Resource
win10v2004-20231215-en
Target
04571e6cdc6be2a9e5d63bca0e623758
Size
218KB
MD5
04571e6cdc6be2a9e5d63bca0e623758
SHA1
ab248eba06531c37b694e6d6f2d063bdb6f436f7
SHA256
ca1c90141e0b58fc5b82194120b8e30b3142b8fc5603dc22250eca26009b8b03
SHA512
efc19dbe44c01bdf06e43e5d265feccbbe7cd2a34ad9d2027269b46ffcec2808774577919308cd2729c5eec78a5478bf2ea07a5542a776889aba27fec47613d3
SSDEEP
6144:O/J+8lVdLEVKlTJy+6Vj5v35yWcZQ2je:cVVdjJy+Wdf5yq
Checks for missing Authenticode signature.
resource |
---|
04571e6cdc6be2a9e5d63bca0e623758 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetProcAddress
LoadLibraryA
FreeLibrary
LocalFree
MapViewOfFile
UnmapViewOfFile
ExitProcess
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
MoveFileExA
lstrlenA
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
InterlockedDecrement
SystemTimeToFileTime
FindNextFileA
QueryPerformanceCounter
SetUnhandledExceptionFilter
WriteFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFileTime
FindFirstFileA
FindClose
DeleteFileA
CopyFileA
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetCurrentThreadId
GetLastError
GetTickCount
InterlockedExchange
FreeConsole
GetExitCodeThread
TerminateThread
DisableThreadLibraryCalls
SetLastError
GetModuleFileNameA
Sleep
ReleaseMutex
CreateMutexA
WaitForSingleObject
CloseHandle
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
UnhandledExceptionFilter
IsBadCodePtr
InitializeCriticalSection
GetCPInfo
GetOEMCP
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsBadWritePtr
GetTimeZoneInformation
SetFilePointer
ReadFile
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
GetCommandLineA
RaiseException
RtlUnwind
ExitThread
CreateThread
IsBadReadPtr
GetModuleHandleA
TerminateProcess
GetFileAttributesA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCurrentProcessId
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowTextA
SetTimer
PostMessageA
MessageBoxA
FindWindowA
SetWindowPos
SystemParametersInfoA
EnumChildWindows
GetWindowThreadProcessId
PostThreadMessageA
KillTimer
EnumWindows
GetClassNameA
RegisterServiceCtrlHandlerA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
RegCreateKeyExA
ControlService
QueryServiceStatus
OpenServiceA
DeleteService
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegCreateKeyA
SetServiceStatus
ShellExecuteA
SHGetFolderPathA
CoCreateInstance
CoCreateGuid
CoInitializeEx
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
VariantInit
Netbios
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
GetProfilesDirectoryA
CreateURLMoniker
ExportFunc
ExportFunc2
ServiceMain
s
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ