DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
TBStudioReg
Static task
static1
Behavioral task
behavioral1
Sample
a066c7df81238ee2b2bcdaca362b0617.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a066c7df81238ee2b2bcdaca362b0617.dll
Resource
win10v2004-20240221-en
Target
a066c7df81238ee2b2bcdaca362b0617
Size
480KB
MD5
a066c7df81238ee2b2bcdaca362b0617
SHA1
87708a3012c5b0188afbea9cf33e0c4a105d5b68
SHA256
7df5c6319a0101304c0c862b3196eb69f959dac374a413517a88a13764bd574c
SHA512
f96bc54778b7f7291ca4a6e8f84e6e64f51c8fa40681ae1088c4db97a0eb8ecd5bd90a423741fef9ddfb1364471d6e509bf61740f0050c36ff10124ac382f119
SSDEEP
12288:XAFyehwbT4x+CFvadXlH224OFe6wnHsyKSdyKOcAQ5b:XAFyehwbkx1aVyQVyKSIRQ5b
Checks for missing Authenticode signature.
resource |
---|
a066c7df81238ee2b2bcdaca362b0617 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PlaySoundA
PathFileExistsA
DeleteUrlCacheEntry
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
SetupIterateCabinetA
SetLastError
GetLastError
GetProcAddress
LoadLibraryA
OutputDebugStringA
LoadLibraryW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
lstrcpyA
lstrcatA
GetCurrentProcessId
Sleep
GlobalUnlock
GlobalLock
LeaveCriticalSection
EnterCriticalSection
lstrlenW
TerminateThread
DebugBreak
GetVersion
FindFirstFileA
GetModuleFileNameA
FreeLibrary
GetTempFileNameA
FlushInstructionCache
GetCurrentProcess
GetVersionExA
lstrcmpA
GetCurrentThreadId
GetShortPathNameA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
DisableThreadLibraryCalls
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
SetEndOfFile
CompareStringA
CompareStringW
WideCharToMultiByte
MultiByteToWideChar
MoveFileExA
GetTempPathA
CreateFileA
WriteFile
CloseHandle
InterlockedIncrement
DeleteFileA
RemoveDirectoryA
lstrlenA
InterlockedDecrement
FindNextFileA
FindClose
GlobalAlloc
ReadFile
SetHandleCount
LCMapStringA
GetDriveTypeA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
SetUnhandledExceptionFilter
HeapSize
TerminateProcess
ExitProcess
TlsGetValue
TlsFree
TlsAlloc
GetCommandLineA
HeapReAlloc
HeapAlloc
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
GetFullPathNameA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
ExitThread
TlsSetValue
CreateThread
ResumeThread
CreateDirectoryA
HeapFree
RtlUnwind
RaiseException
LocalAlloc
InterlockedExchange
LocalFree
LCMapStringW
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
SetFilePointer
GetStartupInfoA
GetFileType
GetStdHandle
SendMessageA
wsprintfA
UnhookWindowsHookEx
GetParent
CharLowerA
SetCapture
MessageBoxA
CharNextA
DefWindowProcA
IsWindowVisible
CloseClipboard
GetClipboardData
OpenClipboard
GetSysColor
SetWindowTextA
GetSystemMetrics
LoadCursorA
RegisterWindowMessageA
RegisterClassExA
GetClassInfoExA
GetWindow
SetWindowLongA
GetWindowTextA
GetWindowTextLengthA
GetWindowLongA
DestroyCursor
EnableMenuItem
PostMessageA
UnregisterClassA
TranslateMessage
DispatchMessageA
MoveWindow
GetWindowRect
EmptyClipboard
LoadCursorFromFileA
CreateWindowExA
GetDlgItem
InvalidateRgn
IsWindow
ReleaseCapture
DestroyAcceleratorTable
CreateAcceleratorTableA
GetDesktopWindow
RedrawWindow
SetWindowPos
EndPaint
IsChild
CallWindowProcA
GetDC
ReleaseDC
FillRect
DrawEdge
OffsetRect
GetMenuItemInfoA
CopyRect
DestroyWindow
SetFocus
ShowWindow
LoadMenuA
GetSubMenu
InsertMenuA
MapWindowPoints
LoadImageA
GetMessagePos
GetCursorPos
GetFocus
LoadStringA
SetWindowsHookExA
WindowFromPoint
SetCursor
ScreenToClient
PtInRect
GetKeyState
GetClassNameA
CallNextHookEx
InvalidateRect
wvsprintfA
TrackPopupMenu
SetTimer
CreatePopupMenu
AppendMenuA
CheckMenuItem
DestroyMenu
KillTimer
GetClientRect
BeginPaint
SetActiveWindow
GetObjectA
DeleteObject
ExtTextOutA
GetTextExtentPoint32A
GetTextMetricsA
SetTextColor
SetBkColor
SetBkMode
SelectObject
CreateBrushIndirect
DeleteDC
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
GetDeviceCaps
GetStockObject
GetTextExtentPointA
CreateFontA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
SHAddToRecentDocs
SHEmptyRecycleBinA
ShellExecuteA
OleInitialize
CLSIDFromProgID
CoCreateInstance
CoCreateGuid
OleUninitialize
CLSIDFromString
CoUninitialize
CoTaskMemFree
StringFromCLSID
CoTaskMemAlloc
OleLockRunning
RegisterDragDrop
ReleaseStgMedium
CoTaskMemRealloc
OleRun
CreateStreamOnHGlobal
CoInitialize
SysAllocString
VariantClear
SysAllocStringByteLen
SysFreeString
LoadTypeLi
SysStringByteLen
VariantInit
VariantChangeType
VariantCopy
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
LoadRegTypeLi
DispCallFunc
OleCreateFontIndirect
SafeArrayCreate
VarUI4FromStr
RegisterTypeLi
GetErrorInfo
SysAllocStringLen
SysStringLen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
TBStudioReg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ