ExportFunc
ExportFunc2
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
87e6539bacc34397e42d27652d1f4d72.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
87e6539bacc34397e42d27652d1f4d72.dll
Resource
win10v2004-20231215-en
Target
87e6539bacc34397e42d27652d1f4d72
Size
231KB
MD5
87e6539bacc34397e42d27652d1f4d72
SHA1
602c50335f263e700d877cf8e5e110300451e9f7
SHA256
aaa9d7b938f36c9388371bc7274df861848993991ba82bd091ecce7416f99489
SHA512
40ab1bb6ae1b6030b785ce89d3cf4de14c5c9b6a64ad4c6f8d45adb553fcfa59f27557a293d57a9c51d6ab0c3551c0b0822d832cd86c4715cbec706f921c5b50
SSDEEP
3072:PyZpfHErG7hF5X2BX7e5XNI4teenhzo1KSLz/q2Ub0qdHz5Kca5kl07QFA:KZcxe5+ghARw5O5y6
Checks for missing Authenticode signature.
resource |
---|
87e6539bacc34397e42d27652d1f4d72 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetProcAddress
LoadLibraryA
FreeLibrary
LocalFree
MapViewOfFile
UnmapViewOfFile
ExitProcess
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
MoveFileExA
lstrlenA
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
InterlockedDecrement
SystemTimeToFileTime
FindNextFileA
LeaveCriticalSection
SetUnhandledExceptionFilter
WriteFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFileTime
FindFirstFileA
FindClose
DeleteFileA
CopyFileA
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetCurrentThreadId
GetLastError
GetTickCount
InterlockedExchange
FreeConsole
GetExitCodeThread
TerminateThread
DisableThreadLibraryCalls
Sleep
SetLastError
GetModuleFileNameA
ReleaseMutex
CreateMutexA
WaitForSingleObject
CloseHandle
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
UnhandledExceptionFilter
IsBadCodePtr
InitializeCriticalSection
GetCPInfo
GetOEMCP
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsBadWritePtr
GetTimeZoneInformation
SetFilePointer
ReadFile
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
GetCurrentProcessId
QueryPerformanceCounter
EnterCriticalSection
GetSystemTimeAsFileTime
GetCommandLineA
RtlUnwind
RaiseException
ExitThread
CreateThread
IsBadReadPtr
GetModuleHandleA
TerminateProcess
GetFileAttributesA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
TranslateMessage
DispatchMessageA
GetMessageA
SetWindowTextA
SetTimer
PostMessageA
MessageBoxA
FindWindowA
SetWindowPos
SystemParametersInfoA
EnumChildWindows
GetWindowThreadProcessId
PostThreadMessageA
KillTimer
EnumWindows
GetClassNameA
RegisterServiceCtrlHandlerA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
RegCreateKeyExA
ControlService
QueryServiceStatus
SetServiceStatus
OpenServiceA
DeleteService
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegCreateKeyA
ShellExecuteA
SHGetFolderPathA
CoCreateInstance
CoCreateGuid
CoInitializeEx
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
VariantInit
Netbios
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
GetProfilesDirectoryA
CreateURLMoniker
ExportFunc
ExportFunc2
ServiceMain
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ