DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a3c392bb0e83f39d30eae4718d26af93.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3c392bb0e83f39d30eae4718d26af93.dll
Resource
win10v2004-20240221-en
Target
a3c392bb0e83f39d30eae4718d26af93
Size
307KB
MD5
a3c392bb0e83f39d30eae4718d26af93
SHA1
a66afa1e1e53f5ed76a7a2bb1914b6868f544310
SHA256
c258e974dcd67173ae01484dcdc444b0c8e3706467ff07746bed82609def5c45
SHA512
9e19c5f75d69064d8b1de7d77742c70d9dbf665cf9b584eb8b43bd6264200d5f69f6e0f87536e1eba91da1c61f5dfc6b1863b743fdb792c8c13234e98a34e86a
SSDEEP
6144:RllCH2WKaDgwPSCL4bwfuE1PXibsnrXQ8n:RllCWWKaDgyX2QuEhM+
Checks for missing Authenticode signature.
resource |
---|
a3c392bb0e83f39d30eae4718d26af93 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DuplicateHandle
OpenProcess
TerminateProcess
SetFileAttributesA
GetFileAttributesA
Sleep
DeleteFileA
WideCharToMultiByte
CreateDirectoryA
GetLocalTime
CopyFileA
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateProcessA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
lstrcpyA
GetShortPathNameA
GetEnvironmentVariableA
GetTickCount
CreateRemoteThread
GetModuleHandleA
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
ResumeThread
HeapFree
HeapAlloc
GetProcessHeap
GetCommandLineA
GetCommandLineW
OpenMutexA
GetTempPathA
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
LockResource
FreeResource
LoadResource
SizeofResource
FindResourceA
LoadLibraryExA
EndUpdateResourceA
UpdateResourceA
GetCurrentProcess
GetLongPathNameA
FindClose
FindNextFileA
FindFirstFileA
GetVolumeInformationA
Toolhelp32ReadProcessMemory
IsBadCodePtr
SetUnhandledExceptionFilter
RaiseException
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
CloseHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
GetLastError
FormatMessageA
LocalFree
SetLastError
GetWindowsDirectoryA
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
GetFileType
GetStdHandle
SetHandleCount
HeapSize
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
HeapCreate
HeapDestroy
ExitProcess
VirtualAlloc
VirtualFree
GetVersion
RtlUnwind
GetTimeZoneInformation
HeapReAlloc
lstrlenA
GetSystemTime
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentDirectoryA
GetFileSize
SetFilePointer
ReadFile
CreateFileA
WriteFile
BeginUpdateResourceA
FindWindowExA
FindWindowA
PostMessageA
wsprintfA
GetWindowThreadProcessId
KillTimer
DefWindowProcA
RegisterClassExA
CreateWindowExA
SetTimer
MessageBoxA
ShowWindow
SetWindowLongA
SendMessageA
EnumChildWindows
GetWindowRect
SetWindowPos
GetParent
GetClassNameA
GetWindowTextA
GetDesktopWindow
IsWindowVisible
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
OpenProcessToken
SetSecurityInfo
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetTokenInformation
LookupAccountSidA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegQueryValueExA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
CommandLineToArgvW
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteExA
SHFileOperationA
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitialize
CLSIDFromString
SysStringLen
LoadRegTypeLi
SysFreeString
SysAllocString
VariantCopy
VariantChangeType
VariantClear
SysAllocStringLen
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ord31
ord16
ord21
ord18
ord57
ord23
ord15
ord32
ord30
ord58
GetModuleFileNameExA
SHDeleteKeyA
Netbios
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ