DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b9a7c3f193fc1f50edd7520e078d4101.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b9a7c3f193fc1f50edd7520e078d4101.dll
Resource
win10v2004-20240226-en
Target
b9a7c3f193fc1f50edd7520e078d4101
Size
228KB
MD5
b9a7c3f193fc1f50edd7520e078d4101
SHA1
ef970121718b9f81e60c61a47db8beee40e508a9
SHA256
407b04f7ac51cd1f7fd97f050613587986988358853d013b9e8ac4e8586c83f0
SHA512
a35f071f20bd87a70e3abd02219935c3176da9b20cada10e7243d6e08cdacb2c5d461de570c38759f8f9697b7404f6d31b6805951544b72d987ae6bee08ed026
SSDEEP
6144:99mXZA/CQ0ScALHCCPfYIZP1FR0ujHzAfJZ:7c+6lScSiRIZtJnAf7
Checks for missing Authenticode signature.
resource |
---|
b9a7c3f193fc1f50edd7520e078d4101 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UrlMkSetSessionOption
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
FreeResource
ExitProcess
lstrcatW
lstrcpyW
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
Process32Next
Module32First
GetTickCount
QueryPerformanceCounter
FlushFileBuffers
SetStdHandle
InitializeCriticalSection
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetCPInfo
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
IsBadWritePtr
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
InterlockedExchange
Sleep
GetCommandLineA
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcpyA
DisableThreadLibraryCalls
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
SetLastError
TlsFree
TlsSetValue
GetCurrentThreadId
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
RaiseException
HeapFree
RtlUnwind
LocalFree
GetCurrentProcessId
VirtualQuery
GetCurrentProcess
HeapSize
TerminateProcess
GetParent
DestroyMenu
EndDialog
SetTimer
LoadStringA
OpenIcon
CharNextA
GetSubMenu
GetFocus
DeleteMenu
IsWindowVisible
wsprintfA
GetSystemMetrics
IsDlgButtonChecked
IsWindow
GetKBCodePage
GetMenuItemCount
GetInputState
GetLastActivePopup
GetScrollPos
GetMenu
KillTimer
ReplyMessage
CloseWindow
wsprintfW
UpdateWindow
InSendMessage
CreateDialogParamA
EnumWindows
FlashWindow
FindWindowA
GetDoubleClickTime
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
ShellExecuteA
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
StringFromGUID2
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantInit
DispCallFunc
VariantClear
SafeArrayGetLBound
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ