SetDllPathA
SetDllPathW
Static task
static1
Behavioral task
behavioral1
Sample
2fe5db59a191c7a857c5863344e1293724ac64b79ae3c89dda5fe172fd181243.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2fe5db59a191c7a857c5863344e1293724ac64b79ae3c89dda5fe172fd181243.dll
Resource
win10v2004-20240802-en
Target
2fe5db59a191c7a857c5863344e1293724ac64b79ae3c89dda5fe172fd181243.dll
Size
48KB
MD5
bab4d119880ede651e1edb7d5d891599
SHA1
b06c29686d0fb77b9ece9d4c79b73859f3ab2495
SHA256
2fe5db59a191c7a857c5863344e1293724ac64b79ae3c89dda5fe172fd181243
SHA512
1d91957778318d3aae28776c18644ae84fafd97f38bb57c65b408fa91775bec0272e9e93eac330b0b0cc0bf33db1588ae0b5f300749212e6fb7063f354a06b72
SSDEEP
768:1jY5P1mAzVOBuiPn5EnsiWGFwlHZB8QACoOOy8:1GPNTA5n/lHwQdory8
Checks for missing Authenticode signature.
resource |
---|
2fe5db59a191c7a857c5863344e1293724ac64b79ae3c89dda5fe172fd181243.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord4616
ord4418
ord3733
ord561
ord825
ord815
ord2717
ord3948
ord540
ord4075
ord800
ord538
ord535
ord861
ord823
ord942
ord4273
ord4199
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord4269
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5285
ord5303
ord1115
ord4692
ord4074
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord1173
ord1568
ord1165
ord269
ord826
ord600
ord1571
ord6466
ord1250
ord1248
ord1563
ord1194
ord1240
ord342
ord1179
ord1570
_except_handler3
ftell
fopen
strchr
sprintf
??1type_info@@UAE@XZ
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
memmove
fseek
fread
fclose
wcscat
wcscpy
wcslen
_wcsicmp
__CxxFrameHandler
_wfopen
CreateFileA
LocalAlloc
LocalFree
MultiByteToWideChar
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
GetCurrentThread
InitializeCriticalSection
GetModuleHandleA
GetCurrentProcess
GetProcAddress
FreeLibrary
GetModuleFileNameW
LoadLibraryW
VirtualQuery
InterlockedCompareExchange
GetCurrentThreadId
ResumeThread
FlushInstructionCache
GetThreadContext
SetThreadContext
GetLastError
SuspendThread
VirtualAlloc
SetLastError
GetSystemDirectoryA
VirtualFree
CloseHandle
WriteFile
?_Xran@std@@YAXXZ
?_Xlen@std@@YAXXZ
SetDllPathA
SetDllPathW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ