DirectInput8Create
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
be93b21db889145b6ddda9bc56b8858849caa4b3a5a37d0e74a590d88d6c8a9a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
be93b21db889145b6ddda9bc56b8858849caa4b3a5a37d0e74a590d88d6c8a9a.dll
Resource
win10v2004-20231222-en
Target
be93b21db889145b6ddda9bc56b8858849caa4b3a5a37d0e74a590d88d6c8a9a
Size
326KB
MD5
74f99e517b7f653ba0fc2f6433d1ad49
SHA1
99b19eefd7e2ef346811f8b342d35f2dba53f05a
SHA256
be93b21db889145b6ddda9bc56b8858849caa4b3a5a37d0e74a590d88d6c8a9a
SHA512
308e2dcaafd1f4f4039f331b9c6d1fc88bd5c2d91c4734715d1cb7eba6779d6d37dff7a152a7360c4f2daf30b075136515356957e687098593e948567c41ce9f
SSDEEP
6144:0gU/Kxp1Rn7u5IOpvg7BKTLqcZfcL6j2pqo3Bv:0gUUX7AIMI7BKT3G6No3Bv
Checks for missing Authenticode signature.
resource |
---|
be93b21db889145b6ddda9bc56b8858849caa4b3a5a37d0e74a590d88d6c8a9a |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
GetUserNameW
RegCloseKey
RegCreateKeyW
RegDeleteTreeW
RegOpenKeyA
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
InitCommonControls
HidD_FreePreparsedData
HidD_GetAttributes
HidD_GetFeature
HidD_GetHidGuid
HidD_GetPreparsedData
HidD_GetProductString
HidD_SetFeature
HidP_GetCaps
HidP_GetLinkCollectionNodes
HidP_GetSpecificButtonCaps
HidP_GetSpecificValueCaps
HidP_GetUsageValue
HidP_GetUsages
HidP_GetUsagesEx
HidP_InitializeReportForID
HidP_MaxUsageListLength
HidP_SetUsageValue
HidP_SetUsages
CancelIoEx
CloseHandle
CreateEventA
CreateEventW
CreateFileW
CreateProcessW
CreateThread
DeleteCriticalSection
DeviceIoControl
DisableThreadLibraryCalls
EnterCriticalSection
EnumResourceNamesW
FindResourceW
GetEnvironmentVariableW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
GetOverlappedResult
GetProcAddress
GetTickCount
GetTickCount64
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
IsBadStringPtrA
IsBadStringPtrW
LeaveCriticalSection
LoadLibraryW
LoadResource
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
SetEvent
SizeofResource
WaitForSingleObject
WideCharToMultiByte
WriteFile
_vsnprintf
CoTaskMemFree
StringFromCLSID
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceInterfaceDetailW
SetupDiOpenDeviceInfoW
__acrt_iob_func
__stdio_common_vsprintf
__stdio_common_vswprintf
_strdup
_wcsnicmp
atan2
calloc
cos
free
fwrite
getenv
malloc
memcmp
memcpy
memmove
memset
round
sin
sqrt
strchr
strcmp
strcpy
strcspn
strlen
strrchr
wcscmp
wcscpy
wcslen
wcsstr
CallNextHookEx
ClipCursor
CreateWindowExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
DispatchMessageW
EndDialog
GetClientRect
GetCursorPos
GetDesktopWindow
GetDlgItem
GetForegroundWindow
GetKeyNameTextW
GetKeyState
GetKeyboardType
GetRawInputData
GetSystemMetrics
GetWindowLongPtrW
GetWindowLongW
GetWindowThreadProcessId
IsWindow
LoadStringW
MapVirtualKeyW
MapWindowPoints
MsgWaitForMultipleObjectsEx
PeekMessageW
PostMessageW
RegisterClassExW
RegisterRawInputDevices
SendDlgItemMessageW
SendMessageW
SetCursorPos
SetWindowLongPtrW
SetWindowsHookExW
ShowCursor
TranslateMessage
UnhookWindowsHookEx
UnregisterClassW
DirectInput8Create
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ