DllGetClassObject
EventStartup
Static task
static1
Behavioral task
behavioral1
Sample
0b9e562e7223efbf26d999c2a0d1d4e2.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b9e562e7223efbf26d999c2a0d1d4e2.dll
Resource
win10v2004-20231215-en
Target
0b9e562e7223efbf26d999c2a0d1d4e2
Size
128KB
MD5
0b9e562e7223efbf26d999c2a0d1d4e2
SHA1
ed2b349362300305428ebc53808f31fd2fef84b3
SHA256
9b22c1dc66e6e1cee36af0e363420e34194b44a885fd0d77359cb5a96426c73a
SHA512
21248130b4dd3a84e584adc7f7e53837262ee95b3c74faa15050edd311545ebf140a5bb953d9a18b041f1e8dcd9c9d62cd0e96ee6680520f9ae135bbb91fa784
SSDEEP
3072:8XihDwAmZMlj6Eeai9NE83MXuTBfCWJPHoU:DtVmMNKNE834uTBqGPHoU
Checks for missing Authenticode signature.
resource |
---|
0b9e562e7223efbf26d999c2a0d1d4e2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_snprintf
_strnicmp
strlen
strstr
_stricmp
memcmp
atoi
_itoa
memcpy
_ultoa
tolower
memset
_chkstk
_allmul
_alldiv
strtok
setsockopt
WSAGetLastError
WSAIoctl
bind
WSAGetOverlappedResult
WSAStartup
WSACreateEvent
shutdown
htons
WSAWaitForMultipleEvents
WSASend
WSASocketW
WSARecv
ntohl
WSASetLastError
getsockname
ntohs
listen
closesocket
HttpAddRequestHeadersA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetSetOptionA
InternetCloseHandle
InternetConnectA
SysAllocString
SysFreeString
PathFileExistsA
CreateThread
GetVolumeInformationA
GetWindowsDirectoryA
GetFileTime
WaitNamedPipeA
FindNextFileA
SetNamedPipeHandleState
HeapAlloc
GetSystemDirectoryA
GetVersionExA
FindClose
RemoveDirectoryA
TransactNamedPipe
HeapSetInformation
HeapCreate
FindFirstFileA
HeapDestroy
HeapFree
FreeLibrary
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
ExitProcess
GetFileAttributesExA
SetFileAttributesA
CreateDirectoryA
TlsGetValue
TlsAlloc
CreateEventA
TlsSetValue
ProcessIdToSessionId
Process32Next
Process32First
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
OpenProcess
Thread32Next
GetModuleHandleA
Thread32First
CreateToolhelp32Snapshot
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GetProcAddress
CloseHandle
OpenThread
GetCurrentProcessId
lstrcpyA
CreateFileA
WaitForMultipleObjects
GetFileSize
ReadFile
GetModuleFileNameA
GetModuleFileNameW
InitializeCriticalSection
ResetEvent
lstrcatA
GetLocalTime
WaitForSingleObject
OpenMutexA
InterlockedCompareExchange
CreateMutexA
lstrlenA
SetEvent
TerminateThread
OutputDebugStringA
Sleep
DuplicateHandle
GetExitCodeThread
ReleaseMutex
FlushFileBuffers
OpenEventA
SetUnhandledExceptionFilter
LeaveCriticalSection
GetCurrentThread
VirtualFree
GetFileInformationByHandle
GetLastError
SystemTimeToFileTime
lstrcmpiA
GetSystemTime
GetCurrentProcess
WriteFile
CreateRemoteThread
EnterCriticalSection
DisconnectNamedPipe
CreateNamedPipeA
ConnectNamedPipe
PeekNamedPipe
GetTempPathA
lstrcmpA
SetFilePointer
SetEndOfFile
GetTempFileNameA
DeleteCriticalSection
VirtualProtect
FlushInstructionCache
VirtualQuery
VirtualAlloc
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
SetLastError
lstrcmpW
MultiByteToWideChar
DeleteFileA
CreateProcessA
GetTickCount
GetFileAttributesA
LoadLibraryA
ShowWindow
PeekMessageA
SetForegroundWindow
WaitForInputIdle
MsgWaitForMultipleObjects
GetSystemMetrics
wsprintfA
DispatchMessageA
ChangeServiceConfigA
RegDeleteKeyA
OpenSCManagerA
RegCreateKeyExA
CloseServiceHandle
OpenServiceA
ControlService
RegQueryValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
ShellExecuteA
SHGetFolderPathA
CoUninitialize
CoInitializeEx
CoCreateInstance
DllGetClassObject
EventStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ