DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4cbde03f1fb0540aa7f5d2b77cb8e4c03e8265e5d3a7353a834a0491a004d282.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4cbde03f1fb0540aa7f5d2b77cb8e4c03e8265e5d3a7353a834a0491a004d282.dll
Resource
win10v2004-20240419-en
Target
4cbde03f1fb0540aa7f5d2b77cb8e4c03e8265e5d3a7353a834a0491a004d282
Size
479KB
MD5
82b9c4ee88d120e7fe5dfae46ed7b0cd
SHA1
119351b62ba74228a6e6a1578be021c7b3a0c6a0
SHA256
4cbde03f1fb0540aa7f5d2b77cb8e4c03e8265e5d3a7353a834a0491a004d282
SHA512
f70db4af8a6273beff2f5e48f681c6535f7cfe3ce0254c697aabb9abf51ddcb2c76e17747c871d742cd15ec41d6dcf284ad8a79b260d901faec5ec82feb67266
SSDEEP
6144:bVv57Ddu6X6IgA3+Zzw4bSp34H5qAlSAxiGuxeohxsiflwcuFOM5SKxr:bF53dL7YZ3bSpIZUxeoAiuOK1
Checks for missing Authenticode signature.
resource |
---|
4cbde03f1fb0540aa7f5d2b77cb8e4c03e8265e5d3a7353a834a0491a004d282 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetCurrentProcessId
CreateDirectoryW
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetExitCodeProcess
GetLastError
WaitForSingleObject
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DecodePointer
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetModuleHandleW
GlobalLock
GlobalUnlock
lstrcpynW
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
InitializeCriticalSectionAndSpinCount
CreateFileW
GetTempPathW
CloseHandle
FindClose
ReadFile
WriteFile
WritePrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
lstrlenW
FreeLibrary
GetPrivateProfileStringW
LoadLibraryW
GetCurrentProcess
GetProcAddress
DeleteCriticalSection
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetACP
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
LoadLibraryExW
InterlockedFlushSList
RtlUnwindEx
RtlPcToFileHeader
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
LoadStringW
wsprintfW
LoadBitmapW
InsertMenuItemW
SetMenuItemBitmaps
InsertMenuW
CreatePopupMenu
DeleteObject
CreateProcessAsUserW
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
SHGetSpecialFolderPathW
SHGetFolderPathW
DragQueryFileW
ReleaseStgMedium
PathRemoveFileSpecW
PathIsDirectoryW
PathFindExtensionW
PathAppendW
StrStrIW
PathFileExistsW
DestroyEnvironmentBlock
CreateEnvironmentBlock
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ