DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
983d4c8b80e6412d3855d8c249a23b52.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
983d4c8b80e6412d3855d8c249a23b52.dll
Resource
win10v2004-20231222-en
Target
983d4c8b80e6412d3855d8c249a23b52
Size
104KB
MD5
983d4c8b80e6412d3855d8c249a23b52
SHA1
f79d1fd7cec6cf4e4a0d04687a95cfd14ec7c331
SHA256
e493048ae0733a4470a1a4697d31df7a005af2aad352e3e87886fbb1188d5f05
SHA512
b2f1eda048ffab7fff1e315bc05fb4050b882054057e9017a8e2d1490960a60839daeba0efefe5c09f87278690208c5c6caaae2814c36484a94f9ff8b28a1ea3
SSDEEP
1536:95M3LCPdZDfQyXVEHexmm2IqCrV1vNecSEJw8GBwFVU5HzOFv6:95UCV1QTHzGVVbeeJw70IiF
Checks for missing Authenticode signature.
resource |
---|
983d4c8b80e6412d3855d8c249a23b52 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcess
GetFileAttributesExA
BindIoCompletionCallback
GetTimeFormatA
ExitThread
GetTempFileNameW
GlobalFindAtomA
HeapSetInformation
GlobalFindAtomW
IsProcessorFeaturePresent
ExpandEnvironmentStringsW
CreateJobObjectW
lstrcpynA
WriteConsoleW
lstrcmpiA
CreateMailslotW
SetStdHandle
RaiseException
AllocConsole
RegisterWaitForSingleObjectEx
GetFileTime
CreateFileW
FindNextVolumeMountPointW
lstrcmpW
GetFileSize
SetFileTime
WriteProfileStringA
VirtualUnlock
DisconnectNamedPipe
GetNumberFormatA
GetEnvironmentVariableW
FindResourceExW
GetVolumeInformationW
VirtualAllocEx
FileTimeToDosDateTime
LocalSize
GetFullPathNameA
GlobalFlags
TryEnterCriticalSection
GetWindowsDirectoryA
GlobalGetAtomNameW
MoveFileW
SetHandleCount
SetConsoleCtrlHandler
GetTempPathA
lstrcpyW
GetCurrentDirectoryA
CreateMutexW
FindFirstChangeNotificationA
SetDefaultCommConfigW
GetFileAttributesA
ConvertDefaultLocale
MultiByteToWideChar
DeleteFileW
ReadDirectoryChangesW
LoadResource
WaitNamedPipeW
GetCurrentProcessId
GetTickCount
InterlockedIncrement
GetModuleHandleA
CreateProcessA
GlobalAlloc
LeaveCriticalSection
GetLastError
WriteFile
CreateFileA
CreateMutexA
CloseHandle
ExpandEnvironmentStringsA
CreateDirectoryA
InterlockedDecrement
GetModuleFileNameA
GetProcessHeap
HeapAlloc
EnterCriticalSection
GetProcAddress
LoadLibraryA
VirtualProtect
VirtualQuery
IsBadReadPtr
GetComputerNameA
CoCreateFreeThreadedMarshaler
OleTranslateAccelerator
RevokeDragDrop
GetRunningObjectTable
CoMarshalInterface
StgIsStorageFile
OleCreateFromFile
CoCreateInstanceEx
GetHGlobalFromILockBytes
OleIsRunning
OleDuplicateData
OleQueryCreateFromData
OleDestroyMenuDescriptor
CoInitializeEx
CoUninitialize
CLSIDFromString
CoInitialize
CoTaskMemAlloc
OleSetContainedObject
CoCreateInstance
StgOpenStorageEx
SHGetMalloc
CommandLineToArgvW
SHBrowseForFolderA
ShellExecuteExA
ExtractIconExW
SHGetSettings
SHChangeNotify
SHOpenFolderAndSelectItems
SHGetFolderPathA
CloseEnhMetaFile
CreateFontIndirectA
PolyBezier
SetBrushOrgEx
RemoveFontResourceW
EnumFontFamiliesExA
GetOutlineTextMetricsA
SetLayout
PolyBezierTo
GetMetaFileBitsEx
SetSystemPaletteUse
PolylineTo
EnumEnhMetaFile
GetViewportOrgEx
PolyPolyline
ExtCreatePen
PaintRgn
Polygon
SetTextColor
CreateDCA
GetCharWidthA
SetViewportExtEx
SetAbortProc
SetWorldTransform
EnumFontFamiliesExW
PlayMetaFile
IntersectClipRect
SetRectRgn
GetDCOrgEx
CreateMetaFileW
GetCharABCWidthsA
GetTextFaceA
GetRgnBox
DeleteObject
SetBkMode
PlayEnhMetaFileRecord
GetClipRgn
GetEnhMetaFileBits
SetMiterLimit
CreateCompatibleBitmap
GetCharWidth32W
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ