DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
1f60c4a1a1edbef8219cce3979c1425dcfbb50efdc16a7f83b28e705dfc42b72.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1f60c4a1a1edbef8219cce3979c1425dcfbb50efdc16a7f83b28e705dfc42b72.dll
Resource
win10v2004-20240508-en
Target
1f60c4a1a1edbef8219cce3979c1425dcfbb50efdc16a7f83b28e705dfc42b72
Size
480KB
MD5
c1ae8cf51397b3f08ed46905216003c0
SHA1
e6b3fb23e512d26c19197a43efa6627c4e6629af
SHA256
1f60c4a1a1edbef8219cce3979c1425dcfbb50efdc16a7f83b28e705dfc42b72
SHA512
3e3a9fda1a0f31c083dee9b447bd2c859237fdb4aa0b9c02b158b5f186d869917186990b34071f44a0a6be4ea022692a006e85e35b33fd7a8f94e82971f49c7a
SSDEEP
6144:e93n/BpyAcMs8/ZmtD7NIYP7k1JQhA3YU1uOohFsazx4+cFcdOfl4nB:e9vBpyFM/ZsNIYPE1uOoIaV1B
Checks for missing Authenticode signature.
resource |
---|
1f60c4a1a1edbef8219cce3979c1425dcfbb50efdc16a7f83b28e705dfc42b72 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetCurrentProcessId
CreateDirectoryW
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetExitCodeProcess
GetLastError
WaitForSingleObject
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DecodePointer
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WideCharToMultiByte
GetCurrentThreadId
GetModuleHandleW
GlobalLock
GlobalUnlock
lstrcpynW
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
CreateFileW
CloseHandle
FindClose
ReadFile
WriteFile
WritePrivateProfileStringW
FreeLibrary
GetPrivateProfileIntW
GetModuleFileNameW
lstrlenW
GetPrivateProfileStringW
LoadLibraryW
GetCurrentProcess
GetProcAddress
MultiByteToWideChar
GetTimeZoneInformation
GetACP
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
LoadLibraryExW
InterlockedFlushSList
RtlUnwindEx
RtlPcToFileHeader
OutputDebugStringW
InitializeSListHead
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
EncodePointer
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
wsprintfW
LoadStringW
SetSecurityDescriptorDacl
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountSidW
InitializeSecurityDescriptor
SetTokenInformation
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
DragQueryFileW
SHGetSpecialFolderPathW
SHGetFolderPathW
ReleaseStgMedium
IIDFromString
PathFileExistsW
DestroyEnvironmentBlock
CreateEnvironmentBlock
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ