DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
54716ca36972f6a7dbc25eac3ca8b8e6.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
54716ca36972f6a7dbc25eac3ca8b8e6.dll
Resource
win10v2004-20231215-en
Target
54716ca36972f6a7dbc25eac3ca8b8e6
Size
100KB
MD5
54716ca36972f6a7dbc25eac3ca8b8e6
SHA1
12eeea58f7762d06d6b2b6fdf1da8a7e18b91c12
SHA256
f0231cde5f0071ceb51d3c36c2bbfea56dc0402d704c89985044c12080dfb271
SHA512
39be5a4af4351f8ec36cb229031899c644e3684d2ffe1860feeda7437b2504c6360ad0303e2ddd912fd70e6ca8b128da897e981a7ebe250cfd569a2093c52b8f
SSDEEP
3072:O04GfltkAPqdwJk+qbLac4FQSve1dul68f8:vhtca9ES0uPk
Checks for missing Authenticode signature.
resource |
---|
54716ca36972f6a7dbc25eac3ca8b8e6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindVolumeMountPointClose
GlobalAddAtomA
SleepEx
IsBadStringPtrA
CreateMailslotW
RemoveDirectoryW
SetConsoleCtrlHandler
CreateToolhelp32Snapshot
VerLanguageNameW
GetThreadLocale
GetModuleFileNameW
ResetEvent
FindNextFileW
CreateFileMappingA
TerminateProcess
TransactNamedPipe
QueueUserAPC
CopyFileW
FindFirstFileExW
FindFirstChangeNotificationW
TerminateJobObject
LocalUnlock
CompareStringW
AddAtomA
GetCurrentProcess
LCMapStringW
SetConsoleCursorPosition
OpenJobObjectW
FindNextFileA
ReadFileEx
CreateFileW
EnumResourceLanguagesA
GetLocalTime
OpenThread
GetCompressedFileSizeW
GetEnvironmentVariableA
SetConsoleTextAttribute
MoveFileW
ReadDirectoryChangesW
DuplicateHandle
SystemTimeToFileTime
GetModuleHandleExW
MultiByteToWideChar
GetCommandLineA
HeapCreate
FindResourceExA
FindNextVolumeMountPointW
SetConsoleActiveScreenBuffer
ReleaseMutex
RemoveDirectoryA
GetBinaryTypeW
GetProfileSectionA
AllocConsole
GetFileInformationByHandle
VirtualUnlock
OpenProcess
OpenFileMappingA
IsValidLocale
GetTimeFormatA
lstrlenW
LocalFileTimeToFileTime
GetAtomNameW
SetEvent
GetSystemWindowsDirectoryA
lstrcpyW
EnumResourceNamesA
GetProfileIntA
WriteConsoleInputA
GetTimeFormatW
CreateRemoteThread
IsBadHugeReadPtr
OpenEventA
GetProfileStringA
ExitThread
SetProcessShutdownParameters
GetEnvironmentStringsW
HeapLock
VirtualProtect
HeapAlloc
GetModuleFileNameA
CreateDirectoryA
CreateProcessA
InterlockedIncrement
HeapFree
LeaveCriticalSection
ExpandEnvironmentStringsA
VirtualQuery
GetProcessHeap
GetModuleHandleA
CopyFileA
GetLastError
GlobalAlloc
WriteFile
ReadFile
GetProcAddress
CloseHandle
LoadLibraryA
GetModuleHandleW
Sleep
SHGetFileInfoA
DragAcceptFiles
ShellExecuteA
ShellAboutA
ExtractIconExA
DragQueryFileW
SHGetFolderPathA
SetSystemPaletteUse
InvertRgn
PatBlt
DPtoLP
GetTextExtentPointW
CreatePalette
GetCharABCWidthsA
GetTextCharacterExtra
SetRectRgn
GetRandomRgn
GetViewportExtEx
SetViewportOrgEx
PlayEnhMetaFileRecord
DescribePixelFormat
PtInRegion
EnumMetaFile
GetCharacterPlacementA
GetObjectA
TextOutA
GetTextMetricsA
SetWindowExtEx
SetICMMode
RemoveFontResourceW
SetLayout
SetTextJustification
MoveToEx
GetNearestPaletteIndex
SetTextAlign
GetTextCharsetInfo
GetBkMode
GetBitmapDimensionEx
ExtFloodFill
GetDIBits
SetBkColor
GetFontResourceInfoW
GetTextExtentExPointA
AnimatePalette
CreateBrushIndirect
CopyMetaFileA
TranslateCharsetInfo
CreateDIBPatternBrushPt
DeleteObject
CopyEnhMetaFileA
SetWindowOrgEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ