DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
05b4b6d1baf1e116457d2edf3bc5e05ca97b961aac18ee97c22849210fe14a1c.dll
Resource
win7-20240903-en
Target
05b4b6d1baf1e116457d2edf3bc5e05ca97b961aac18ee97c22849210fe14a1c
Size
184KB
MD5
d0173ab4603d90329a63bb0ab8ad28be
SHA1
2624ee6558601b0c0124a2229ae9d5d56b3c685c
SHA256
05b4b6d1baf1e116457d2edf3bc5e05ca97b961aac18ee97c22849210fe14a1c
SHA512
2690ff9ec979182da59598bf2387b5dc6f4d6800caddefb1af95d75e49170b1556329e42798d900a84aac38b3bcd09f4119764d025f97ce41480a77afab9f669
SSDEEP
3072:0EHPhyRcKZgqPQrz3yjonmAMJIsffXUUTNy1:VvhutSCjodAXUU5k
Checks for missing Authenticode signature.
resource |
---|
05b4b6d1baf1e116457d2edf3bc5e05ca97b961aac18ee97c22849210fe14a1c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
FreeLibrary
SizeofResource
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
DisableThreadLibraryCalls
GetLongPathNameA
GetVersionExA
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrcpyA
lstrcatA
GetProcAddress
LoadLibraryA
GetFileAttributesA
GetSystemDirectoryA
WinExec
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
SetUnhandledExceptionFilter
WriteFile
GetModuleHandleA
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
TerminateProcess
LCMapStringW
LCMapStringA
RtlUnwind
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
ExitProcess
RaiseException
GetVersion
GetCommandLineA
HeapReAlloc
HeapAlloc
HeapFree
GetTimeZoneInformation
GetLocalTime
LocalFree
GetShortPathNameA
GetCurrentProcess
FlushInstructionCache
lstrcmpA
lstrlenW
FindResourceA
LoadResource
LockResource
GlobalHandle
WideCharToMultiByte
GlobalFree
FreeResource
GetCurrentThreadId
OutputDebugStringA
DebugBreak
GlobalAlloc
GlobalLock
GlobalUnlock
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
lstrlenA
GetEnvironmentStringsW
ShowWindow
LoadStringA
GetWindowRect
SetTimer
MoveWindow
KillTimer
DestroyWindow
GetWindowLongA
GetSystemMetrics
CreateWindowExA
SetWindowLongA
RegisterClassExA
LoadCursorA
GetClassInfoExA
RegisterWindowMessageA
DefWindowProcA
GetWindow
LoadBitmapA
FindWindowExA
FindWindowA
GetAsyncKeyState
PostMessageA
PtInRect
DrawTextA
wsprintfA
GetClassNameA
GetDlgItem
InvalidateRgn
InvalidateRect
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetParent
GetDC
GetDesktopWindow
ReleaseDC
RedrawWindow
IsWindow
SetWindowPos
BeginPaint
GetClientRect
FillRect
EndPaint
CallWindowProcA
GetFocus
IsChild
SetFocus
GetSysColor
CreateDialogIndirectParamA
SendMessageA
CharNextA
wvsprintfA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
SetBkMode
SetTextColor
GetStockObject
GetDeviceCaps
CreateSolidBrush
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateFontA
GetObjectA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
ShellExecuteA
SHGetSpecialFolderPathA
CoTaskMemFree
CoInitialize
CoUninitialize
CoTaskMemRealloc
CreateStreamOnHGlobal
CoTaskMemAlloc
StringFromCLSID
OleLockRunning
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
LoadTypeLi
RegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
OleCreateFontIndirect
SysStringLen
SysAllocString
SysAllocStringLen
VariantCopy
VariantChangeType
VariantClear
SysFreeString
URLDownloadToFileA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ