DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b4ce5d456dfa1d0e5d3ba79b66f40938.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b4ce5d456dfa1d0e5d3ba79b66f40938.dll
Resource
win10v2004-20240226-en
Target
b4ce5d456dfa1d0e5d3ba79b66f40938
Size
224KB
MD5
b4ce5d456dfa1d0e5d3ba79b66f40938
SHA1
d35e14f6f78ea2e5b7cc1ecf734e5731ac07a406
SHA256
7ab15c8974edd52a93c0dd854d7fea9c9f14e9f2e9758159456b99b0bd464992
SHA512
e95f0abe089a61865603932a91221c225933a20601b415448b7b75c3a344c47c62e3f5ed83802d8230d03f21ad048507c5eb6d6c1164a44403929d793365641f
SSDEEP
3072:UURwJ219Ox+V4b34WDDw7zyJ3Y7CUSMaDpVFzn2ss1RjuccUiwAXgde:G219OtXWeRFMsVptURju4dAXgde
Checks for missing Authenticode signature.
resource |
---|
b4ce5d456dfa1d0e5d3ba79b66f40938 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UrlMkSetSessionOption
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
ExitProcess
lstrcatW
lstrcpyW
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
Process32Next
Module32First
InitializeCriticalSection
FreeEnvironmentStringsW
FlushFileBuffers
SetStdHandle
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
IsBadReadPtr
InterlockedExchange
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcpyA
DisableThreadLibraryCalls
GetStringTypeA
GetEnvironmentStrings
GetCPInfo
GetOEMCP
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
SetLastError
IsBadCodePtr
GetEnvironmentStringsW
LocalFree
RtlUnwind
HeapFree
RaiseException
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
TlsSetValue
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
HeapSize
TlsFree
SetTimer
LoadStringA
CharNextA
wsprintfA
KillTimer
wsprintfW
SetCaretBlinkTime
CreateMenu
GetActiveWindow
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegCreateKeyA
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
ShellExecuteA
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
StringFromGUID2
CoTaskMemFree
CoCreateInstance
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantInit
DispCallFunc
VariantClear
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ