DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b46be174a59d36d1900d998ea76a3dfcc6b03b34c6b82a439746efeae9473844.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b46be174a59d36d1900d998ea76a3dfcc6b03b34c6b82a439746efeae9473844.dll
Resource
win10v2004-20240709-en
Target
b46be174a59d36d1900d998ea76a3dfcc6b03b34c6b82a439746efeae9473844
Size
1.0MB
MD5
57e59419813765ba695c3c012fd1a5b0
SHA1
ad39d88b3acac65be6b5e0b22b2a97300f5f6de8
SHA256
b46be174a59d36d1900d998ea76a3dfcc6b03b34c6b82a439746efeae9473844
SHA512
3665a39de8df6d4ba06d0a7a2967ba340616c5c2499724eeb6b7de8827bee4ad7f32b036fa71e309c5007830e388252ed587e5e0b01acb671209d9470c9c02b1
SSDEEP
12288:MwyZDmXcypRiLkEe5A+8rQ0ryktkbMo+d2eC2FeRBhXO+3ee5/mqB:5yFbypQje5P8rQ0r/WIDdbePtOMeekw
Checks for missing Authenticode signature.
resource |
---|
b46be174a59d36d1900d998ea76a3dfcc6b03b34c6b82a439746efeae9473844 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetTickCount
lstrlenW
FreeLibrary
GetProcAddress
OpenProcess
LoadLibraryW
GetCurrentThreadId
Sleep
GetLogicalDriveStringsW
GetModuleFileNameW
LocalAlloc
LocalFree
TerminateProcess
WaitForSingleObject
GetProcessHeap
GetVersionExW
OutputDebugStringW
VirtualQuery
GetCurrentProcessId
GetModuleFileNameA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GlobalLock
GlobalUnlock
lstrcpynW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
DecodePointer
MoveFileW
DeleteFileW
CreateFileW
CreateDirectoryW
FindResourceW
CloseHandle
FindClose
ReadFile
WriteFile
SizeofResource
LoadResource
GetLastError
GetCurrentProcess
LockResource
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
WriteConsoleW
GetTimeZoneInformation
RtlUnwind
SetEndOfFile
SetStdHandle
ReadConsoleW
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStdHandle
GetACP
GetModuleHandleExW
ExitProcess
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetFileType
RtlPcToFileHeader
RtlUnwindEx
CreateTimerQueue
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
TryEnterCriticalSection
GetStringTypeW
QueryPerformanceCounter
SetLastError
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetCurrentThread
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
VirtualAlloc
VirtualProtect
VirtualFree
DuplicateHandle
ReleaseSemaphore
wsprintfW
GetUserNameW
LookupAccountSidW
GetTokenInformation
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
SHGetFolderPathW
DragQueryFileW
ShellExecuteExW
ReleaseStgMedium
PathFileExistsA
PathFileExistsW
SHDeleteKeyW
PathRemoveFileSpecW
PathRemoveFileSpecA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetProcessImageFileNameW
EnumProcesses
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ