DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
aa1cbbafc41735fe8e794a6e5d8e5410.dll
Resource
win7-20240221-en
Target
aa1cbbafc41735fe8e794a6e5d8e5410
Size
264KB
MD5
aa1cbbafc41735fe8e794a6e5d8e5410
SHA1
439c128008abf32242c4290bba1232f20127d1f4
SHA256
e16ac3f14e8b78ef1f56643f0ecaa9310659d498e1a2712575763bf09c0c3376
SHA512
b35b7bd7433ac3d9d8299c5462f20f11bfc4e0303e17d189c089015cff9d57a38711703911662037452cf8d2a73db86b7b18aae3e5d265d84463c32a07d576e9
SSDEEP
6144:MQL46sq9C9X3xVHG8EnSEpawFWAf23j9Wpxhq:F5s1xVHG8ESkDcAfcjKxM
Checks for missing Authenticode signature.
resource |
---|
aa1cbbafc41735fe8e794a6e5d8e5410 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
SetFilePointer
CreateFileA
GetTempFileNameA
lstrcatA
CreateDirectoryA
GetTempPathA
WaitForSingleObject
InterlockedIncrement
InterlockedDecrement
RemoveDirectoryA
DeleteFileA
CloseHandle
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateMutexA
MultiByteToWideChar
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
SizeofResource
LoadResource
FindResourceA
SetEndOfFile
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
lstrcpyA
CreateThread
CreateEventA
SetEvent
Sleep
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
ReleaseMutex
FreeLibrary
GetVersion
lstrcmpiA
lstrcmpA
lstrlenA
lstrlenW
WideCharToMultiByte
LoadLibraryA
GetProcAddress
GetLastError
SetUnhandledExceptionFilter
ReadFile
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LocalFree
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
RaiseException
ExitProcess
GetCPInfo
GetACP
GetOEMCP
GetEnvironmentVariableA
GetVersionExA
HeapCreate
VirtualFree
VirtualAlloc
RtlUnwind
TerminateProcess
GetCurrentProcess
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
FindWindowExA
RegisterWindowMessageA
InsertMenuA
RemoveMenu
CallNextHookEx
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
CharNextA
SendMessageTimeoutA
GetClassNameA
GetMenuItemCount
GetMenuStringA
GetMenuState
GetMenuItemID
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
SysAllocString
VarUI4FromStr
VariantClear
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE