?__ablcavenxld@@YAJXZ
?__aevtift@@YA_WXZ
?__ihticvpix@@YAKXZ
?__jsgpmt@@YAGXZ
?__lklzvfuianhzvp@@YAMXZ
?__odfgscxmucbsc@@YAOXZ
?__oyqwhnrxtewvro@@YA_WXZ
?__rtrmhdssjmp@@YAEXZ
Static task
static1
Behavioral task
behavioral1
Sample
97094eab2884306be6db0ca43cc9481da0e82fb385682cf830b3c08f267cba0e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
97094eab2884306be6db0ca43cc9481da0e82fb385682cf830b3c08f267cba0e.dll
Resource
win10v2004-20240419-en
Target
97094eab2884306be6db0ca43cc9481da0e82fb385682cf830b3c08f267cba0e
Size
6.2MB
MD5
cf20f3922f9cb8ed8b036e5df9466703
SHA1
def7564cd005a2b681b9225316e24b55270b8b71
SHA256
97094eab2884306be6db0ca43cc9481da0e82fb385682cf830b3c08f267cba0e
SHA512
5392184197323310abcc29684d4d3cedbd56c4237ae8648bd43ce4ac61d66d7a6915c5bb1845681e84048138cd3c4d9c38dca89a3768555b9e44140499973503
SSDEEP
98304:RG8jYy2As23k1xrL2P3agHF5UuvTcTI3Hzj49e0jctKvN+Ztfcvd/+QTJfEa9vbH:MlT6CrM7F5tciTEEkctAOjWlEkvbff
Checks for missing Authenticode signature.
resource |
---|
97094eab2884306be6db0ca43cc9481da0e82fb385682cf830b3c08f267cba0e |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CloseHandle
GetModuleFileNameW
WriteFile
FreeEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetFileType
GetStdHandle
GetACP
HeapSize
GetModuleHandleExW
ExitProcess
GetProcessHeap
IsDebuggerPresent
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
LoadLibraryExW
OutputDebugStringW
SetStdHandle
WriteConsoleW
ReadConsoleW
CreateFileW
CreateThread
CreatePipe
DeviceIoControl
LoadLibraryA
RaiseException
GetSystemDirectoryA
GetFileAttributesW
lstrcpynW
GetFileAttributesA
Sleep
ClearCommBreak
GetEnvironmentStringsW
VerSetConditionMask
SetDllDirectoryW
SetFilePointer
GetTempFileNameW
OpenFileMappingA
GetVersion
GetOEMCP
FindClose
GlobalFree
VirtualAlloc
IsDBCSLeadByteEx
FindFirstFileA
GlobalUnlock
LeaveCriticalSection
SetCommState
VirtualQueryEx
GetWindowsDirectoryA
SetEnvironmentVariableW
GetCPInfo
TlsGetValue
EnumResourceNamesW
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
IsValidCodePage
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsSetValue
TlsAlloc
EncodePointer
DecodePointer
EnterCriticalSection
DeleteCriticalSection
GetStringTypeW
GetLastError
HeapFree
GetSystemTimeAsFileTime
HeapReAlloc
GetCurrentThreadId
RtlUnwind
HeapAlloc
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
CharLowerBuffW
CharNextW
PostMessageW
GetKeyState
GetSubMenu
SetScrollRange
ScrollWindow
SetWindowLongW
EndDialog
DestroyCursor
IsDlgButtonChecked
CheckRadioButton
RegisterClassW
GetDlgItemTextA
CheckMenuItem
CopyRect
ClientToScreen
GetDlgItemTextW
MsgWaitForMultipleObjects
GetDlgItemInt
ModifyMenuW
ShowCaret
CreateIconIndirect
InflateRect
OffsetRect
GetKeyboardLayout
GetClassNameW
EnableMenuItem
EnumChildWindows
GetMenuItemCount
CreateCaret
GetCaretBlinkTime
DestroyIcon
TranslateMDISysAccel
WaitMessage
BeginDeferWindowPos
CheckDlgButton
MessageBoxA
MonitorFromWindow
MaskBlt
CreateBrushIndirect
GetCharWidth32A
CreatePatternBrush
Polyline
CreateDIBitmap
ExtCreatePen
SetLayout
ExtFloodFill
GetCharacterPlacementW
CreateFontIndirectW
CopyEnhMetaFileA
SetPixel
CreatePalette
DeleteObject
CombineRgn
GetObjectW
GetTextExtentExPointA
SetStretchBltMode
GetNearestPaletteIndex
CreateRectRgn
GetStockObject
ExtTextOutA
CloseEnhMetaFile
CreateEnhMetaFileW
CreateBitmap
RectInRegion
SetPolyFillMode
UpdateColors
GetTextExtentPoint32W
FindTextW
RegEnumKeyExW
ControlService
RegSetKeySecurity
CloseServiceHandle
RegCloseKey
RegLoadKeyW
ChangeServiceConfigW
RegConnectRegistryW
RegGetKeySecurity
RegQueryInfoKeyW
AllocateAndInitializeSid
Shell_NotifyIconW
CoInitialize
SysFreeString
?__ablcavenxld@@YAJXZ
?__aevtift@@YA_WXZ
?__ihticvpix@@YAKXZ
?__jsgpmt@@YAGXZ
?__lklzvfuianhzvp@@YAMXZ
?__odfgscxmucbsc@@YAOXZ
?__oyqwhnrxtewvro@@YA_WXZ
?__rtrmhdssjmp@@YAEXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ