DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
9c41b11d1c02514f68b1860997a6967b.dll
Resource
win7-20231215-en
Target
9c41b11d1c02514f68b1860997a6967b
Size
353KB
MD5
9c41b11d1c02514f68b1860997a6967b
SHA1
78153b19464327ddd4e8a458a6090d843d7596ee
SHA256
170d56c026b740e73db162fe58dfe0247bafd40cf941e559103ea977d3f49b11
SHA512
8ae09cc63b95d5f46fed3349ca62e0c8c5efa0004b5e7d1217aa658c383cd8522ea09fc77028c3cf5046424513c09e22ddadf88b053db75e3572080a50d3ade7
SSDEEP
6144:Z5KxVXVz6eF/qqJqYFuVMwNEYQlaZkOsaeYYGmg0G/KBTA/:ZExVpF/qqLwNSRqevBTA
Checks for missing Authenticode signature.
resource |
---|
9c41b11d1c02514f68b1860997a6967b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SizeofResource
LoadResource
LockResource
CreateFileW
WriteFile
CloseHandle
CreateThread
lstrcmpiW
MultiByteToWideChar
GetModuleHandleW
RaiseException
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
FreeLibrary
SetThreadLocale
WinExec
OpenProcess
lstrlenA
LoadLibraryW
FindResourceW
LoadLibraryExW
GetTickCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetLastError
lstrlenW
GetThreadLocale
WideCharToMultiByte
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
ExitProcess
HeapSize
Sleep
SetLastError
TlsFree
TlsSetValue
TlsAlloc
GetStdHandle
TlsGetValue
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetProcessHeap
GetVersionExA
GetCommandLineA
GetCurrentThreadId
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapAlloc
InterlockedExchange
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
HeapReAlloc
HeapFree
EnumWindows
CharNextW
MessageBoxW
CharLowerA
CharLowerW
GetWindowThreadProcessId
PostMessageW
UnregisterClassA
IsTextUnicode
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
SHGetFolderPathW
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoGetClassObject
StringFromGUID2
CoCreateInstance
LoadRegTypeLi
RegisterTypeLi
VariantClear
SysAllocStringLen
SysFreeString
VarUI4FromStr
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VarBstrCmp
SysStringLen
LoadTypeLi
VarBstrCat
UnRegisterTypeLi
NdrOleFree
NdrStubForwardingFunction
NdrOleAllocate
NdrDllRegisterProxy
NdrDllCanUnloadNow
IUnknown_Release_Proxy
NdrCStdStubBuffer2_Release
IUnknown_AddRef_Proxy
NdrDllGetClassObject
NdrDllUnregisterProxy
IUnknown_QueryInterface_Proxy
InternetSetCookieW
InternetGetCookieW
InternetCloseHandle
InternetReadFile
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetCrackUrlW
InternetOpenW
CoInternetGetSession
EnumProcesses
GetModuleBaseNameW
EnumProcessModules
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ