DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
startFile
startInet
Static task
static1
Behavioral task
behavioral1
Sample
40c29c2e691f28844092da318ef557f518b2e34b80529c4a12affad2e49958b0.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
40c29c2e691f28844092da318ef557f518b2e34b80529c4a12affad2e49958b0.dll
Resource
win10v2004-20240226-en
Target
40c29c2e691f28844092da318ef557f518b2e34b80529c4a12affad2e49958b0
Size
571KB
MD5
ef96b8c7139d6014dc84a21b433f504a
SHA1
aff471b82bb6b6358acb7a17014c0a94e6a25317
SHA256
40c29c2e691f28844092da318ef557f518b2e34b80529c4a12affad2e49958b0
SHA512
b55ca3f45842bba5308d3a55ff4d80c0ed9c8230bee7771dd9aeb63e7158c72d8c8e1354b3c61d59a1f887f743c34634daa81cd77687509e4ea94d2c1cbde207
SSDEEP
12288:o7HOtcjAusgIxCQS/9Ra4IX6Gfe7iib8V/DEXcqgY6EVHvg5uWx/iChIifYq9dDQ:7YVai0Iiwq9VHsMr0V
Checks for missing Authenticode signature.
resource |
---|
40c29c2e691f28844092da318ef557f518b2e34b80529c4a12affad2e49958b0 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Process32FirstW
CreateThread
Module32FirstW
GetFileSize
GetCurrentProcessId
Module32NextW
CreateProcessA
GetTickCount
lstrcmpW
GetLogicalDrives
FindFirstFileA
GetDriveTypeA
InitializeProcThreadAttributeList
FindNextFileA
FindClose
UpdateProcThreadAttribute
ReadFileEx
RemoveDirectoryA
GetDiskFreeSpaceExA
LoadLibraryA
GetProcAddress
GetCurrentProcess
lstrcatA
ProcessIdToSessionId
GetLastError
GetFileAttributesA
GetCurrentThread
GetComputerNameExA
CreateDirectoryA
CreateDirectoryW
SetFileTime
SetFilePointer
CreateFileW
GetFileAttributesW
LocalFileTimeToFileTime
DeleteFileA
SystemTimeToFileTime
WideCharToMultiByte
VerSetConditionMask
VerifyVersionInfoW
FindNextFileW
GetFileType
WriteConsoleW
GetConsoleMode
GetConsoleOutputCP
CreateFileA
Process32NextW
MultiByteToWideChar
CreateToolhelp32Snapshot
OpenProcess
GetModuleFileNameW
OutputDebugStringA
CopyFileW
CreateProcessW
CloseHandle
DeleteFileW
Sleep
WaitForSingleObject
PeekNamedPipe
CreatePipe
TerminateProcess
ExpandEnvironmentStringsW
WriteFile
SetHandleInformation
FlushFileBuffers
HeapSize
SetStdHandle
SetFilePointerEx
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCurrentDirectoryW
ReadFile
HeapReAlloc
GetStdHandle
GetFileAttributesExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetLocaleInfoEx
GetStringTypeW
CompareStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetTimeZoneInformation
HeapFree
HeapAlloc
FlsAlloc
FlsGetValue
FlsSetValue
GetLastInputInfo
wsprintfW
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyA
RegQueryInfoKeyW
RegQueryValueExA
AllocateAndInitializeSid
RegCreateKeyExW
OpenProcessToken
FreeSid
CheckTokenMembership
RegDeleteKeyW
DuplicateToken
OpenThreadToken
RegCloseKey
RegSetValueExA
htonl
inet_ntop
bind
closesocket
gethostbyname
WSAAccept
WSAStartup
socket
recv
htons
connect
send
listen
GetAdaptersAddresses
WinHttpOpenRequest
WinHttpSetOption
WinHttpCloseHandle
WinHttpReadData
WinHttpWriteData
WinHttpSendRequest
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpReceiveResponse
WinHttpGetIEProxyConfigForCurrentUser
DllCanUnloadNow
DllGetActivationFactory
DllGetClassObject
startFile
startInet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ