DllGetActivationFactory
StartApplication
Static task
static1
Behavioral task
behavioral1
Sample
93c185e7662bebc3712a638498e41831f4f771c1782bf6dad1668d81331cb4d5.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
93c185e7662bebc3712a638498e41831f4f771c1782bf6dad1668d81331cb4d5.dll
Resource
win10v2004-20240412-en
Target
93c185e7662bebc3712a638498e41831f4f771c1782bf6dad1668d81331cb4d5
Size
661KB
MD5
2334e109f7b3879a5c36f86093d67d12
SHA1
f8c6ba9615d77b7806c912b33fe2b2d1c859a5f6
SHA256
93c185e7662bebc3712a638498e41831f4f771c1782bf6dad1668d81331cb4d5
SHA512
7b6dd75ab7a57192638fd8143815ec9a29a663fc20ce51421eb0b510974ac5f996f22e6c285ec75bf2545265ae4581470b12d9a77aac5f75d66b43c1928a6b3c
SSDEEP
12288:o4N+lwBdMlVA5KXXrPI26B6cA1EAdm0tRTUph0lhSMXliGo0vF:t+lwfMlMmX96B6dEAo0tRTqh0lhSMXlt
Checks for missing Authenticode signature.
resource |
---|
93c185e7662bebc3712a638498e41831f4f771c1782bf6dad1668d81331cb4d5 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
FindNextFileW
FindClose
MultiByteToWideChar
GetTickCount64
GetLastError
Process32NextW
GetCurrentThread
CloseHandle
CreateRemoteThread
GetTickCount
SetLastError
TerminateProcess
ResumeThread
ExitProcess
VirtualProtect
VirtualFree
GetCurrentProcess
VirtualAlloc
GetCurrentThreadId
SuspendThread
GetThreadContext
FlushInstructionCache
SetThreadContext
VirtualQuery
WriteFile
UnmapViewOfFile
GetProcAddress
GetModuleHandleW
FreeLibrary
LoadLibraryExW
VerSetConditionMask
WideCharToMultiByte
VerifyVersionInfoW
HeapSize
FlushFileBuffers
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetStringTypeW
QueryPerformanceCounter
GetModuleHandleExW
CreateFileW
FindFirstFileExW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsProcessorFeaturePresent
RtlPcToFileHeader
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeSRWLock
TryAcquireSRWLockExclusive
InitializeConditionVariable
WakeConditionVariable
GetSystemTimeAsFileTime
GetCPInfo
InitializeCriticalSectionAndSpinCount
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlUnwind
ReadFile
GetModuleFileNameW
HeapAlloc
HeapFree
GetStdHandle
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
SetFilePointerEx
HeapReAlloc
GetConsoleOutputCP
IsValidCodePage
GetACP
WriteConsoleW
GetAddrInfoExW
InetPtonW
DllGetActivationFactory
StartApplication
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ