DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2eb344159a9a9fb0373a4f7a4f2d29ad2fd06a80fae3ab69904ef6d7ba27e645.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2eb344159a9a9fb0373a4f7a4f2d29ad2fd06a80fae3ab69904ef6d7ba27e645.dll
Resource
win10v2004-20240611-en
Target
2eb344159a9a9fb0373a4f7a4f2d29ad2fd06a80fae3ab69904ef6d7ba27e645
Size
301KB
MD5
becd0a76e9b5301f2f0ab0b2715d0f2a
SHA1
ed2ad20f9d15befe1de55352eb0ea21c3eab30d8
SHA256
2eb344159a9a9fb0373a4f7a4f2d29ad2fd06a80fae3ab69904ef6d7ba27e645
SHA512
a5541620889765cfa2817855175401cd4e1c65e14aa772e4b23870feecd9c79461328f480751510d8047ddbd14df177959d70eb3193cd7ed17e264cae17ccec1
SSDEEP
6144:imDHdh25omm4iKM2w8yf+xAixQH0sIMfZNfj3yhfzlQ+LohXKqkm:iKh25omNiKtNxAPUsIjlQgoVk
Checks for missing Authenticode signature.
resource |
---|
2eb344159a9a9fb0373a4f7a4f2d29ad2fd06a80fae3ab69904ef6d7ba27e645 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
CreateDirectoryW
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
OpenProcess
TerminateProcess
GetExitCodeProcess
GetLastError
WaitForSingleObject
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
MultiByteToWideChar
WideCharToMultiByte
GetCurrentThreadId
GetCurrentProcessId
GetModuleHandleW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
SizeofResource
lstrcmpiW
LoadLibraryExW
FindResourceW
EncodePointer
DecodePointer
GetThreadLocale
SetThreadLocale
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
CreateFileW
CloseHandle
FindClose
ReadFile
WriteFile
WritePrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
GetPrivateProfileStringW
LoadLibraryW
FreeLibrary
GetCurrentProcess
GetProcAddress
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetACP
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
InterlockedFlushSList
RtlUnwindEx
RtlPcToFileHeader
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetStringTypeW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
IsDebuggerPresent
OutputDebugStringW
QueryPerformanceCounter
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
CharNextW
LoadStringW
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
DuplicateTokenEx
CreateProcessAsUserW
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetTokenInformation
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
SHGetFolderPathW
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
CoCreateInstance
SysFreeString
SysStringLen
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
SysAllocString
RegisterTypeLi
UnRegisterTypeLi
PathFileExistsW
DestroyEnvironmentBlock
CreateEnvironmentBlock
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ