DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8a4eefa28566a1785e692158f91f0143acae33cdadd4cc3461b8a04f4038e695.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8a4eefa28566a1785e692158f91f0143acae33cdadd4cc3461b8a04f4038e695.dll
Resource
win10v2004-20240226-en
Target
8a4eefa28566a1785e692158f91f0143acae33cdadd4cc3461b8a04f4038e695
Size
309KB
MD5
4651230bfdc3f92601312c58cb07a967
SHA1
f6176771f9a8f0a2672459718ad85273a9a5345d
SHA256
8a4eefa28566a1785e692158f91f0143acae33cdadd4cc3461b8a04f4038e695
SHA512
269c61cb345ed528002ad3522b85e39f3b4188d99624a467274b93e2114ee068a4f909b00e0329ad7f4c6e04ee35016476785266b56484824e33d7f7b966a94b
SSDEEP
6144:gTYZcLgO8AMegz2wt0ZwUtQo8HEpvvI8vw+/72l96RLh9oh/qU7kvy5P:gUZcLgOoe5gety6vvIbgLLokUSy5P
Checks for missing Authenticode signature.
resource |
---|
8a4eefa28566a1785e692158f91f0143acae33cdadd4cc3461b8a04f4038e695 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetCurrentProcessId
CreateDirectoryW
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetExitCodeProcess
GetLastError
WaitForSingleObject
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetModuleHandleW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
SizeofResource
lstrcmpiW
LoadLibraryExW
FindResourceW
EncodePointer
DecodePointer
GetThreadLocale
SetThreadLocale
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
CreateFileW
CloseHandle
FindClose
ReadFile
WriteFile
WritePrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
GetPrivateProfileStringW
LoadLibraryW
FreeLibrary
GetCurrentProcess
GetProcAddress
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetACP
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
InterlockedFlushSList
RtlUnwindEx
RtlPcToFileHeader
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetStringTypeW
LoadStringW
CharNextW
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
SHGetSpecialFolderPathW
SHGetFolderPathW
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
StringFromGUID2
CoTaskMemRealloc
SysFreeString
SysStringLen
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
SysAllocString
RegisterTypeLi
UnRegisterTypeLi
PathFileExistsW
DestroyEnvironmentBlock
CreateEnvironmentBlock
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ