DllMain
FinalizeHook
InitializeHook
Static task
static1
Behavioral task
behavioral1
Sample
0301df8a5bf9b1149cab2692ace0600f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0301df8a5bf9b1149cab2692ace0600f.dll
Resource
win10v2004-20231215-en
Target
0301df8a5bf9b1149cab2692ace0600f
Size
200KB
MD5
0301df8a5bf9b1149cab2692ace0600f
SHA1
41fd4e82747d8c1b197c261699ee71fe7d1b6718
SHA256
15e834fce512b016f91e9f146e1a720378f1c967a23add0989579ee106c3adec
SHA512
13a527e77a195d29e44f960808e0b34719139569e5280f526cfac3ef3b6e094780240346741ec8818c51ead898c1d5edeaed7594f040a00806347ff60a50624d
SSDEEP
1536:X74cIK58ZmPgk0yZyzEGy/zlqHyFsEEuKop21MbcPqlzm2qRdbCYgt7krX55oeZj:X74258kj0yZyYxKREYg9Qp5oe9
Checks for missing Authenticode signature.
resource |
---|
0301df8a5bf9b1149cab2692ace0600f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetVersionExA
GetUserDefaultLCID
GetCommandLineA
GetVersion
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetCurrentThread
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
IsBadWritePtr
IsBadReadPtr
HeapValidate
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
SetConsoleCtrlHandler
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
UnhandledExceptionFilter
HeapAlloc
HeapReAlloc
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetFilePointer
RtlUnwind
SetStdHandle
Sleep
FlushFileBuffers
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
SetEnvironmentVariableA
SetWindowsHookExA
SendMessageA
CallNextHookEx
MessageBoxA
UnhookWindowsHookEx
DllMain
FinalizeHook
InitializeHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ