DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InstallHook
SendLog
Setval
Static task
static1
Behavioral task
behavioral1
Sample
571004433a559c8f385e8381b7f7fd8f.dll
Resource
win7-20231215-en
Target
571004433a559c8f385e8381b7f7fd8f
Size
172KB
MD5
571004433a559c8f385e8381b7f7fd8f
SHA1
3a9d0fa3332560c0205709831c681f73dae24f7b
SHA256
3268af951c18b4b52dc1c2bc9a61d1acb29b6610ae378cb275b86fceae09450c
SHA512
799df5c9f4f7a08dcb894556838a12198c340a00233ac047257ec9ea4049b05897554a380ce3fa75c021c58ecfbb405c4fa599a34612113d99551170d2559a2a
SSDEEP
3072:MHh9fyoiRRQk3qNaYVJDmFMWnkSYtJtt2Acno:69BeRrY7DwOJW
Checks for missing Authenticode signature.
resource |
---|
571004433a559c8f385e8381b7f7fd8f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsDBCSLeadByte
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
TerminateThread
GetCurrentProcessId
DisableThreadLibraryCalls
SetThreadLocale
GetThreadLocale
lstrcpynA
GetVersionExA
CallNamedPipeA
VirtualQuery
WaitForSingleObject
CreateEventA
OutputDebugStringA
lstrcpyA
lstrcmpA
GetCurrentThreadId
CreateThread
GetProcAddress
LoadLibraryA
MapViewOfFile
lstrcmpiA
UnmapViewOfFile
CloseHandle
SetEvent
HeapSize
GetStdHandle
WriteFile
ExitProcess
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
lstrlenA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
CreateFileMappingA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStringTypeW
HeapCreate
GetStringTypeA
LCMapStringW
LCMapStringA
HeapDestroy
VirtualFree
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
InterlockedExchange
GetACP
GetLocaleInfoA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
RtlUnwind
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
GetCPInfo
Sleep
GetFocus
CharLowerA
IsWindowEnabled
IsWindowVisible
UnregisterClassA
GetClassNameA
UnhookWindowsHookEx
SetWindowLongA
SetWindowLongW
GetParent
GetWindowThreadProcessId
GetClassLongA
SendMessageA
IsWindow
PostMessageA
KillTimer
SetTimer
SetWindowsHookExA
CallNextHookEx
IsWindowUnicode
GetGUIThreadInfo
GetAncestor
EnumChildWindows
SetFocus
CallWindowProcW
CallWindowProcA
GetWindowLongW
GetWindowLongA
CharNextA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
CoCreateInstance
OleRun
CLSIDFromString
CoInitialize
CLSIDFromProgID
RegisterTypeLi
UnRegisterTypeLi
VariantClear
SysAllocString
LoadTypeLi
LoadRegTypeLi
SysStringLen
VarUI4FromStr
SysAllocStringLen
SysFreeString
GetErrorInfo
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InstallHook
SendLog
Setval
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ