StartHook
StopHook
Static task
static1
Behavioral task
behavioral1
Sample
71f6e72a2c0306a620ff187d62daa0870bc9f14c164334f8439e728fbe6b4197.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
71f6e72a2c0306a620ff187d62daa0870bc9f14c164334f8439e728fbe6b4197.dll
Resource
win10v2004-20240508-en
Target
71f6e72a2c0306a620ff187d62daa0870bc9f14c164334f8439e728fbe6b4197
Size
3.0MB
MD5
c5e3e012ed02804aa10faa8cbc064e1e
SHA1
6117df871e16a073d613d530accf3a364ce98439
SHA256
71f6e72a2c0306a620ff187d62daa0870bc9f14c164334f8439e728fbe6b4197
SHA512
cc4136132dabd9ac0b506a0560f2161f8a1be87984c3e5957c2c4f86409dd806023de2eb6526f1f36c495894d7ab36c83f135e451eb582a17506d05441b33287
SSDEEP
49152:t09zpBwQWVtZk41ye8QThBteUeAFrNhJfATgBg5gilA4C94F8s6DKr:czpGVtZk4xlOUecrJIMu/24FwDK
Checks for missing Authenticode signature.
resource |
---|
71f6e72a2c0306a620ff187d62daa0870bc9f14c164334f8439e728fbe6b4197 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D3DXCreateLine
D3DXCreateSprite
D3DXCreateTextureFromFileA
D3DXCreateFontA
CreateFileW
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetSystemInfo
HeapAlloc
IsWow64Process
GetCurrentProcess
HeapCreate
GetSystemDirectoryA
ReadFile
InitializeCriticalSection
VirtualFree
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
LoadLibraryW
OutputDebugStringA
ExitProcess
VirtualProtect
HeapFree
MultiByteToWideChar
GetLastError
QueryDosDeviceW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
WideCharToMultiByte
OpenProcess
TerminateProcess
LocalAlloc
LocalFree
GetLocalTime
ReadProcessMemory
GetFileInformationByHandle
SetFilePointer
CreateEventA
AddVectoredExceptionHandler
GetCommandLineA
CreateThread
QueueUserWorkItem
WaitForSingleObject
GlobalLock
GlobalUnlock
GetTickCount
WriteFile
FindResourceA
SizeofResource
LoadResource
LockResource
CloseHandle
SetEvent
FreeLibrary
lstrcatA
lstrlenA
TerminateThread
GlobalMemoryStatusEx
lstrlenW
lstrcpyW
ResetEvent
CancelIo
WaitForMultipleObjects
InterlockedExchange
GetStartupInfoW
GetSystemDirectoryW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetFileType
GetStdHandle
GetACP
GetModuleHandleExW
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
GetVersionExW
LoadLibraryExW
GetModuleFileNameW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
SetEndOfFile
GetConsoleCP
FreeLibraryAndExitThread
GetThreadTimes
HeapSize
WriteConsoleW
SetStdHandle
GetProcessHeap
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
GetTimeZoneInformation
HeapReAlloc
Sleep
VirtualQuery
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
EncodePointer
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentThread
GetCurrentDirectoryW
FindClose
FindFirstFileExW
GetFileAttributesExW
AreFileApisANSI
SetLastError
GetModuleHandleW
FormatMessageW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
FlushFileBuffers
EnumChildWindows
GetClassNameA
GetWindowTextLengthA
GetWindowTextA
MessageBoxA
IsWindow
SetTimer
GetWindowLongA
PostMessageA
GetAsyncKeyState
OpenClipboard
GetClipboardData
CloseClipboard
SendMessageA
SetWindowsHookExA
SetForegroundWindow
GetCursorPos
SetCursorPos
UnhookWindowsHookEx
GetParent
EnumWindows
GetCursorInfo
DestroyCursor
LoadCursorA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ShellExecuteA
CoInitializeEx
GetExtendedTcpTable
AddIPAddress
NtTerminateProcess
NtSetInformationProcess
NtQueryVirtualMemory
NtProtectVirtualMemory
NtQuerySystemInformation
NtQueryInformationProcess
RtlImageNtHeader
RtlDecompressBuffer
htons
setsockopt
select
inet_addr
WSAStartup
getaddrinfo
WSACleanup
WSAConnect
WSARecv
WSASend
closesocket
WSAAsyncSelect
ioctlsocket
connect
send
recv
WSAEnumNetworkEvents
WSAEventSelect
socket
WSAGetLastError
inet_ntoa
getsockname
freeaddrinfo
WSAIoctl
PathFindFileNameW
StartHook
StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ