DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
UnInstall
Static task
static1
Behavioral task
behavioral1
Sample
134859e19b6cb9e2712479aaeddc5cf1.dll
Resource
win7-20231215-en
Target
134859e19b6cb9e2712479aaeddc5cf1
Size
353KB
MD5
134859e19b6cb9e2712479aaeddc5cf1
SHA1
7bd37e984de9a663acf37686468c0d8a995680d4
SHA256
cb7b7e1def3dde21ba9cea172aa20d201c3fabd73d4f00eadd6e734f813b8b91
SHA512
bb15aadec4dbb1dc939a58c2f2f16573c1e00bef55eebd8624cfc2bca6c5342c88079179e4ff9ae0ea7ef7b48caae070fa6d1e76bc12f956f65c30b6be19fb59
SSDEEP
6144:VPVKrHotxLafsK4te8vn0mshUbw91Hx2q7SFLQtOT:VPOozafbke8vn0msiq1RqJQu
Checks for missing Authenticode signature.
resource |
---|
134859e19b6cb9e2712479aaeddc5cf1 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryExW
CreateThread
GetLastError
WideCharToMultiByte
lstrlenW
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
GetModuleHandleW
GetModuleFileNameW
MultiByteToWideChar
lstrcmpiW
RaiseException
SetThreadLocale
GetThreadLocale
FindResourceW
GetVersionExW
GetWindowsDirectoryW
WinExec
OpenProcess
lstrlenA
GetProcAddress
LoadLibraryW
FreeLibrary
SizeofResource
LoadResource
LockResource
CreateFileW
WriteFile
CloseHandle
GetTickCount
LeaveCriticalSection
FindResourceExW
EnterCriticalSection
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
HeapSize
Sleep
VirtualAlloc
VirtualFree
HeapCreate
ExitProcess
HeapDestroy
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
GetProcessHeap
GetVersionExA
GetCommandLineA
GetCurrentThreadId
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapReAlloc
HeapAlloc
HeapFree
InterlockedExchange
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
RtlUnwind
EnumWindows
CharNextW
MessageBoxW
CharLowerA
CharLowerW
PostMessageW
GetWindowThreadProcessId
UnregisterClassA
IsTextUnicode
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
SHGetFolderPathW
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoGetClassObject
StringFromGUID2
CoCreateInstance
VarUI4FromStr
RegisterTypeLi
VarBstrCat
SysFreeString
SysAllocStringLen
SysAllocString
SysAllocStringByteLen
SysStringByteLen
VarBstrCmp
LoadRegTypeLi
LoadTypeLi
SysStringLen
VariantClear
UnRegisterTypeLi
NdrOleFree
NdrOleAllocate
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrDllGetClassObject
NdrDllCanUnloadNow
NdrCStdStubBuffer_Release
NdrCStdStubBuffer2_Release
NdrDllRegisterProxy
NdrDllUnregisterProxy
NdrStubForwardingFunction
InternetGetCookieW
InternetSetCookieW
InternetCrackUrlW
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
InternetReadFile
CoInternetGetSession
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
UnInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ