DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
69159e7c584739a3c1433fb47e8ab07e.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
69159e7c584739a3c1433fb47e8ab07e.dll
Resource
win10v2004-20231222-en
Target
69159e7c584739a3c1433fb47e8ab07e
Size
104KB
MD5
69159e7c584739a3c1433fb47e8ab07e
SHA1
d160d165806a60d174edd1cdfd8cb80c78c74b3f
SHA256
e52ed95bce26721b6665e4ad8edf20a2b87a89adc044b3d2df640694a9455e3b
SHA512
fb84a33d1fe2c4a8c32aa94005d44b611402c67148f9f11d8876896b2a9215d46b66b3d62c36fc9c25315a541e8a91b43fc14482e4d9457debc7552bcca7da06
SSDEEP
1536:fb1Mjs1cA/PPIKsunAN/KPf93kzvb427JmQ/UOVIZgZFUN+b56NB:t1DfIHunAVifG427EQ/USI6ZF1bY
Checks for missing Authenticode signature.
resource |
---|
69159e7c584739a3c1433fb47e8ab07e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
VirtualQuery
WriteFile
GetCurrentProcessId
MoveFileA
GetTickCount
ReleaseMutex
LoadLibraryA
WaitForSingleObject
CreateMutexA
UnmapViewOfFile
InitializeCriticalSection
GetComputerNameA
GetProcAddress
EnterCriticalSection
GetModuleFileNameA
GetProcessHeap
LeaveCriticalSection
MapViewOfFile
VirtualProtect
Sleep
HeapAlloc
CopyFileA
CreateThread
InterlockedIncrement
UnlockFile
ReadDirectoryChangesW
FormatMessageW
FindAtomW
EscapeCommFunction
TransactNamedPipe
lstrcmpW
GetLocaleInfoA
DeviceIoControl
GetStartupInfoA
HeapCompact
WinExec
SwitchToThread
GetFileInformationByHandle
OpenEventA
EnumResourceLanguagesA
SetTimeZoneInformation
IsBadWritePtr
CreateConsoleScreenBuffer
SizeofResource
SetFilePointer
GetLocaleInfoW
MapViewOfFileEx
GetNumberFormatA
FindNextVolumeMountPointW
HeapWalk
SetComputerNameExW
WaitForMultipleObjectsEx
GetTimeZoneInformation
IsBadStringPtrA
RemoveDirectoryW
DisconnectNamedPipe
GetUserDefaultUILanguage
GetSystemDirectoryA
FindCloseChangeNotification
SetVolumeLabelW
GlobalMemoryStatusEx
VerSetConditionMask
GetProfileIntW
GetConsoleOutputCP
UnregisterWaitEx
FreeResource
GetModuleHandleExW
FindFirstChangeNotificationW
IsBadHugeReadPtr
GetAtomNameA
MoveFileExA
DuplicateHandle
ReadProcessMemory
OpenEventW
HeapUnlock
MoveFileW
SetWaitableTimer
GetComputerNameExW
CreateJobObjectW
HeapLock
CreateIoCompletionPort
OpenFileMappingA
ExitThread
GetStartupInfoW
GetComputerNameW
GetDiskFreeSpaceExW
EnumResourceNamesA
OpenFileMappingW
VerLanguageNameW
GetSystemDirectoryW
GetConsoleMode
GetDiskFreeSpaceW
FindFirstChangeNotificationA
MultiByteToWideChar
GetThreadTimes
FileTimeToDosDateTime
WaitForSingleObjectEx
CreateTimerQueue
QueueUserAPC
SetFileAttributesA
FlushViewOfFile
ProcessIdToSessionId
QueryPerformanceFrequency
SetFilePointerEx
FindNextFileW
GetTimeFormatA
ConvertDefaultLocale
OpenMutexA
SetConsoleCursorPosition
lstrlenA
SetLocalTime
FindVolumeClose
LocalReAlloc
GetFileSizeEx
GetLargestConsoleWindowSize
QueueUserWorkItem
FileTimeToSystemTime
ReadFileEx
SetProcessWorkingSetSize
GlobalReAlloc
GetSystemTimeAdjustment
LocalFileTimeToFileTime
IsBadReadPtr
GetWindowsDirectoryA
EnumResourceNamesW
LocalUnlock
CreateTimerQueueTimer
GetThreadContext
GetStdHandle
AreFileApisANSI
CreateMailslotA
ReplaceFileW
OpenProcess
ReleaseSemaphore
GetStringTypeExW
ReadConsoleA
BindIoCompletionCallback
CreatePipe
lstrcpynW
CreateRemoteThread
PurgeComm
CallNamedPipeA
GetShortPathNameA
FindFirstFileExW
IsValidLocale
CreateDirectoryW
EnumUILanguagesW
FileTimeToLocalFileTime
DosDateTimeToFileTime
GetFileAttributesA
WaitNamedPipeW
SetFileApisToOEM
UnhookWindowsHookEx
SetWindowLongA
SendMessageA
GetWindowLongA
CreateWindowExA
GetClassNameA
FindWindowA
GetMessageA
GetWindowThreadProcessId
GetClientRect
RegisterClassExA
SetWindowsHookExA
PeekMessageA
GetTopWindow
MessageBoxA
CreateIconIndirect
GetMenuItemID
GrayStringW
LockWindowUpdate
GetSystemMenu
GetMenuItemInfoA
GetPropA
CreateDialogParamW
DefDlgProcW
DefDlgProcA
SetParent
UnregisterClassW
SetActiveWindow
GetWindowTextLengthA
ChildWindowFromPoint
AllowSetForegroundWindow
SetWindowContextHelpId
IsDlgButtonChecked
GetDC
CharUpperBuffW
ReleaseCapture
GetUpdateRect
OemToCharA
SetRectEmpty
GetWindowTextW
LoadCursorA
DialogBoxIndirectParamA
ScrollWindow
DialogBoxParamW
CreateAcceleratorTableW
SetWindowTextW
GetDoubleClickTime
WinHelpW
CharNextExA
CallWindowProcA
ShowOwnedPopups
ToAscii
LoadImageA
EqualRect
InvalidateRect
DestroyIcon
LoadMenuA
UnpackDDElParam
AdjustWindowRect
DestroyWindow
SendNotifyMessageA
ReuseDDElParam
CharPrevA
OpenInputDesktop
EndTask
DialogBoxParamA
FindWindowW
EnumWindows
GetMenu
GetIconInfo
LookupIconIdFromDirectory
SetSysColors
SetFocus
SendDlgItemMessageA
SetWindowPlacement
IsChild
GetScrollRange
DrawFrameControl
UnhookWindowsHook
CloseWindowStation
RedrawWindow
GetScrollPos
IsWindowVisible
EnumThreadWindows
TranslateMDISysAccel
TranslateMessage
GetMenuItemCount
DestroyCursor
RemoveMenu
SetMenuItemInfoA
GetWindowRect
CreateMenu
InsertMenuA
SetScrollPos
GetSystemMetrics
GetAsyncKeyState
GetKeyNameTextW
EndDialog
GetDCEx
IsCharAlphaW
ModifyMenuA
SetCaretPos
DeferWindowPos
DrawFocusRect
GetWindowInfo
GetThreadDesktop
UpdateWindow
ScrollDC
MessageBeep
GetCursorPos
DialogBoxIndirectParamW
LoadAcceleratorsA
PostQuitMessage
GrayStringA
DestroyCaret
GetMenuItemInfoW
WinHelpA
InsertMenuW
MapWindowPoints
OpenWindowStationA
EnableMenuItem
GetScrollBarInfo
KillTimer
CreateDialogParamA
CallMsgFilterW
LoadImageW
GetMessagePos
IsWindowEnabled
RemovePropA
GetComboBoxInfo
CharUpperW
GetWindowTextA
TrackPopupMenuEx
MsgWaitForMultipleObjectsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ