DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetProductSKU
InstallEngineTypelib
RemoveEngineTypelib
Overview
overview
7Static
static
3StealthDup...up.dll
windows7-x64
1StealthDup...up.dll
windows10-2004-x64
1StealthDup...up.dll
windows7-x64
1StealthDup...up.dll
windows10-2004-x64
1StealthDup...up.exe
windows7-x64
7StealthDup...up.exe
windows10-2004-x64
7StealthDup...up.dll
windows7-x64
1StealthDup...up.dll
windows10-2004-x64
1StealthDup...up.dll
windows7-x64
1StealthDup...up.dll
windows10-2004-x64
1StealthDup...up.exe
windows7-x64
7StealthDup...up.exe
windows10-2004-x64
7StealthDup...��.url
windows7-x64
1StealthDup...��.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
StealthDupecheck-v3.0/ISSetup.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
StealthDupecheck-v3.0/ISSetup.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
StealthDupecheck-v3.0/_setup.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
StealthDupecheck-v3.0/_setup.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
StealthDupecheck-v3.0/setup.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
StealthDupecheck-v3.0/setup.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
StealthDupecheck-v3.0/unicode/ISSetup.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
StealthDupecheck-v3.0/unicode/ISSetup.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
StealthDupecheck-v3.0/unicode/_setup.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
StealthDupecheck-v3.0/unicode/_setup.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
StealthDupecheck-v3.0/unicode/setup.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
StealthDupecheck-v3.0/unicode/setup.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
StealthDupecheck-v3.0/新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
StealthDupecheck-v3.0/新云软件.url
Resource
win10v2004-20231215-en
Target
1fdfb8d123bd1cf30fec199f5ae7f8fd
Size
3.2MB
MD5
1fdfb8d123bd1cf30fec199f5ae7f8fd
SHA1
ae10c405ea317bf61c1e5a68971eba8f7b6a0d11
SHA256
832d6ca65d582bc5f219d0e10b27149e88c470ce479bec68064a67c1cc99101b
SHA512
1c45cf5782bab0a0423c3c6e45733ea3bcd481e8d03e4fa8ea37a56ef75fda065ea27b1939f0a60372c77da3cad9100dd56028019960c21c7fc02845aa6b63ac
SSDEEP
98304:JFYXUG1YL2T1KmQk1yiOCAuVoswhjFQhjtlOd8Hdqq0:LYUGJ1GCAu16je54tp
Checks for missing Authenticode signature.
resource |
---|
unpack001/StealthDupecheck-v3.0/ISSetup.dll |
unpack001/StealthDupecheck-v3.0/setup.exe |
unpack001/StealthDupecheck-v3.0/unicode/ISSetup.dll |
unpack001/StealthDupecheck-v3.0/unicode/setup.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
WaitForInputIdle
CreatePalette
LookupPrivilegeValueA
SHGetMalloc
WriteClassStm
BSTR_UserFree
UuidCreate
mciSendCommandA
GetFileVersionInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetProductSKU
InstallEngineTypelib
RemoveEngineTypelib
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
LoadLibraryExA
QueryPerformanceFrequency
CreateEventA
ReadFile
CompareStringA
CompareStringW
GlobalSize
SizeofResource
FreeResource
SearchPathA
FindNextFileA
GetTempFileNameA
GetExitCodeProcess
TerminateProcess
OpenProcess
GetLocalTime
InitializeCriticalSection
GetCurrentProcessId
GetVersion
LeaveCriticalSection
EnterCriticalSection
GetCurrentThread
VirtualQuery
VirtualProtect
UnmapViewOfFile
GetShortPathNameA
MapViewOfFile
CreateFileMappingA
SetEvent
ResetEvent
QueryPerformanceCounter
SystemTimeToFileTime
lstrcmpA
MoveFileExA
GetDiskFreeSpaceA
GetSystemDirectoryA
GetSystemInfo
IsBadReadPtr
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
lstrcpyA
lstrlenA
Sleep
CloseHandle
CreateProcessA
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
RemoveDirectoryA
DeleteFileA
ResumeThread
SetThreadContext
MulDiv
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
SetEndOfFile
FlushFileBuffers
SetStdHandle
IsBadCodePtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
HeapSize
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
TlsGetValue
TlsAlloc
CreateDirectoryA
FindFirstFileA
FindClose
lstrcmpiA
lstrcpynA
WriteFile
GetDriveTypeA
SetFilePointer
GetFileAttributesA
ReleaseMutex
GetPrivateProfileIntA
lstrcatA
LoadLibraryA
GetSystemDefaultLangID
CreateMutexA
FreeLibrary
SetErrorMode
GetTickCount
FindResourceExA
FindResourceA
LoadResource
LockResource
GetWindowsDirectoryA
InterlockedDecrement
LocalFree
InterlockedIncrement
FormatMessageA
GetTempPathA
GetVersionExA
CreateFileA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetLastError
SetLastError
WaitForSingleObject
ExitProcess
GetCurrentProcess
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
TlsSetValue
GetCurrentThreadId
GetCommandLineA
GetStartupInfoA
RaiseException
HeapAlloc
HeapFree
RtlUnwind
DeleteCriticalSection
InterlockedExchange
GetFileSize
SetWindowLongA
SetWindowTextA
SendMessageA
GetDlgItem
wsprintfA
WaitForInputIdle
CharUpperA
MessageBoxA
DialogBoxIndirectParamA
SetDlgItemTextA
MsgWaitForMultipleObjects
CharLowerBuffA
SetFocus
BeginPaint
EndPaint
LoadStringA
FillRect
ScreenToClient
GetWindowTextLengthA
GetWindowTextA
GetWindowPlacement
SendDlgItemMessageA
GetMessageA
DefWindowProcA
GetParent
GetWindow
SystemParametersInfoA
MapWindowPoints
SetWindowPos
GetPropA
EnableMenuItem
SetPropA
RemovePropA
ShowWindow
IsWindow
GetSysColor
LoadImageA
CreateDialogParamA
GetDC
ReleaseDC
SetActiveWindow
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
CreateDialogIndirectParamA
SetForegroundWindow
GetDesktopWindow
GetClientRect
EnableWindow
IsWindowEnabled
GetWindowDC
UpdateWindow
InvalidateRect
DrawIcon
MapDialogRect
GetClassNameA
CallWindowProcA
DrawFocusRect
InflateRect
DrawTextA
CopyRect
EnumChildWindows
CreateWindowExA
RegisterClassExA
IntersectRect
GetDlgItemTextA
GetWindowLongA
GetWindowRect
MoveWindow
EndDialog
LoadIconA
CreateCompatibleBitmap
CreateDCA
GetStockObject
GetTextExtentPoint32A
CreatePatternBrush
DeleteMetaFile
SetMetaFileBitsEx
SetStretchBltMode
SelectClipRgn
SetPixel
PatBlt
PlayMetaFile
StretchBlt
CreateBitmap
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
CreateDIBitmap
SaveDC
SetBkMode
SetTextColor
TextOutA
RestoreDC
GetTextExtentPointA
CreateFontIndirectA
SetBkColor
CreateRectRgn
DeleteObject
CreateSolidBrush
GetDIBColorTable
GetSystemPaletteEntries
CreatePalette
CreateHalftonePalette
GetDeviceCaps
GetObjectA
CreateCompatibleDC
UnrealizeObject
SelectPalette
RealizePalette
SelectObject
BitBlt
DeleteDC
SetMapMode
RegCloseKey
RegQueryValueA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyA
RegOpenKeyA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteExA
SHGetSpecialFolderLocation
CoInitialize
CoUninitialize
SysFreeString
SysAllocString
SysAllocStringLen
SysReAllocStringLen
SysStringLen
GetErrorInfo
VariantClear
VariantChangeType
LZOpenFileA
LZCopy
LZClose
RpcStringFreeA
UuidCreate
UuidToStringA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
WaitForInputIdle
CreatePalette
LookupPrivilegeValueA
SHGetMalloc
WriteClassStm
BSTR_UserFree
UuidCreate
mciSendCommandA
GetFileVersionInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetProductSKU
InstallEngineTypelib
RemoveEngineTypelib
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord17
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
LoadLibraryExA
QueryPerformanceFrequency
CreateEventA
ReadFile
CompareStringA
CompareStringW
GlobalSize
SizeofResource
FreeResource
SearchPathA
FindNextFileA
GetTempFileNameA
GetExitCodeProcess
TerminateProcess
OpenProcess
GetLocalTime
InitializeCriticalSection
GetCurrentProcessId
GetVersion
LeaveCriticalSection
EnterCriticalSection
GetCurrentThread
VirtualQuery
VirtualProtect
UnmapViewOfFile
GetShortPathNameA
MapViewOfFile
CreateFileMappingA
SetEvent
ResetEvent
QueryPerformanceCounter
SystemTimeToFileTime
lstrcmpA
MoveFileExA
GetDiskFreeSpaceA
GetSystemDirectoryA
GetSystemInfo
IsBadReadPtr
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
lstrcpyA
lstrlenA
Sleep
CloseHandle
CreateProcessA
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
RemoveDirectoryA
DeleteFileA
ResumeThread
SetThreadContext
MulDiv
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
SetEndOfFile
FlushFileBuffers
SetStdHandle
IsBadCodePtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
HeapSize
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
TlsGetValue
TlsAlloc
CreateDirectoryA
FindFirstFileA
FindClose
lstrcmpiA
lstrcpynA
WriteFile
GetDriveTypeA
SetFilePointer
GetFileAttributesA
ReleaseMutex
GetPrivateProfileIntA
lstrcatA
LoadLibraryA
GetSystemDefaultLangID
CreateMutexA
FreeLibrary
SetErrorMode
GetTickCount
FindResourceExA
FindResourceA
LoadResource
LockResource
GetWindowsDirectoryA
InterlockedDecrement
LocalFree
InterlockedIncrement
FormatMessageA
GetTempPathA
GetVersionExA
CreateFileA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetLastError
SetLastError
WaitForSingleObject
ExitProcess
GetCurrentProcess
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
TlsSetValue
GetCurrentThreadId
GetCommandLineA
GetStartupInfoA
RaiseException
HeapAlloc
HeapFree
RtlUnwind
DeleteCriticalSection
InterlockedExchange
GetFileSize
SetWindowLongA
SetWindowTextA
SendMessageA
GetDlgItem
wsprintfA
WaitForInputIdle
CharUpperA
MessageBoxA
DialogBoxIndirectParamA
SetDlgItemTextA
MsgWaitForMultipleObjects
CharLowerBuffA
SetFocus
BeginPaint
EndPaint
LoadStringA
FillRect
ScreenToClient
GetWindowTextLengthA
GetWindowTextA
GetWindowPlacement
SendDlgItemMessageA
GetMessageA
DefWindowProcA
GetParent
GetWindow
SystemParametersInfoA
MapWindowPoints
SetWindowPos
GetPropA
EnableMenuItem
SetPropA
RemovePropA
ShowWindow
IsWindow
GetSysColor
LoadImageA
CreateDialogParamA
GetDC
ReleaseDC
SetActiveWindow
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
CreateDialogIndirectParamA
SetForegroundWindow
GetDesktopWindow
GetClientRect
EnableWindow
IsWindowEnabled
GetWindowDC
UpdateWindow
InvalidateRect
DrawIcon
MapDialogRect
GetClassNameA
CallWindowProcA
DrawFocusRect
InflateRect
DrawTextA
CopyRect
EnumChildWindows
CreateWindowExA
RegisterClassExA
IntersectRect
GetDlgItemTextA
GetWindowLongA
GetWindowRect
MoveWindow
EndDialog
LoadIconA
CreateCompatibleBitmap
CreateDCA
GetStockObject
GetTextExtentPoint32A
CreatePatternBrush
DeleteMetaFile
SetMetaFileBitsEx
SetStretchBltMode
SelectClipRgn
SetPixel
PatBlt
PlayMetaFile
StretchBlt
CreateBitmap
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
CreateDIBitmap
SaveDC
SetBkMode
SetTextColor
TextOutA
RestoreDC
GetTextExtentPointA
CreateFontIndirectA
SetBkColor
CreateRectRgn
DeleteObject
CreateSolidBrush
GetDIBColorTable
GetSystemPaletteEntries
CreatePalette
CreateHalftonePalette
GetDeviceCaps
GetObjectA
CreateCompatibleDC
UnrealizeObject
SelectPalette
RealizePalette
SelectObject
BitBlt
DeleteDC
SetMapMode
RegCloseKey
RegQueryValueA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyA
RegOpenKeyA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteExA
SHGetSpecialFolderLocation
CoInitialize
CoUninitialize
SysFreeString
SysAllocString
SysAllocStringLen
SysReAllocStringLen
SysStringLen
GetErrorInfo
VariantClear
VariantChangeType
LZOpenFileA
LZCopy
LZClose
RpcStringFreeA
UuidCreate
UuidToStringA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ