DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8e5cd0b1c88110652b54fc942fa0a867.dll
Resource
win7-20231215-en
Target
8e5cd0b1c88110652b54fc942fa0a867
Size
347KB
MD5
8e5cd0b1c88110652b54fc942fa0a867
SHA1
41af8a67c30934b1057793e75a5cee64a4aba398
SHA256
1c728288ccfab4c4c97e3d5da004cba8748b8f043f6573bd01a8126c86d251ea
SHA512
3b892d5ce8ed2bace773427746004133070a06767cea8f13fe797bd31d46bddffef0230134368c9b11e5a3137588e6de1fd1dc09d81d7e9339cfb0e09e7db95e
SSDEEP
6144:kPAtannJHaLL1UZfbbw0FlkU2tpluCaqdLIgyuC+GYjV/KBTA/TfxMr:kPoangL1UZfX1nkUgOgLbGNBTArxw
Checks for missing Authenticode signature.
resource |
---|
8e5cd0b1c88110652b54fc942fa0a867 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SizeofResource
LoadResource
LockResource
CreateFileW
WriteFile
CloseHandle
CreateThread
lstrcmpiW
MultiByteToWideChar
GetModuleHandleW
RaiseException
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
FreeLibrary
SetThreadLocale
WinExec
OpenProcess
lstrlenA
LoadLibraryW
FindResourceW
LoadLibraryExW
GetTickCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetLastError
lstrlenW
GetThreadLocale
WideCharToMultiByte
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
ExitProcess
HeapSize
Sleep
SetLastError
TlsFree
TlsSetValue
TlsAlloc
GetStdHandle
TlsGetValue
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetProcessHeap
GetVersionExA
GetCommandLineA
GetCurrentThreadId
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapAlloc
InterlockedExchange
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
HeapReAlloc
HeapFree
EnumWindows
CharNextW
MessageBoxW
CharLowerA
CharLowerW
GetWindowThreadProcessId
PostMessageW
UnregisterClassA
IsTextUnicode
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
SHGetFolderPathW
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoGetClassObject
StringFromGUID2
CoCreateInstance
LoadRegTypeLi
RegisterTypeLi
VariantClear
SysAllocStringLen
SysFreeString
VarUI4FromStr
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VarBstrCmp
SysStringLen
LoadTypeLi
VarBstrCat
UnRegisterTypeLi
NdrOleFree
NdrStubForwardingFunction
NdrOleAllocate
NdrDllRegisterProxy
NdrDllCanUnloadNow
IUnknown_Release_Proxy
NdrCStdStubBuffer2_Release
IUnknown_AddRef_Proxy
NdrDllGetClassObject
NdrDllUnregisterProxy
IUnknown_QueryInterface_Proxy
InternetSetCookieW
InternetGetCookieW
InternetCloseHandle
InternetReadFile
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetCrackUrlW
InternetOpenW
CoInternetGetSession
EnumProcesses
GetModuleBaseNameW
EnumProcessModules
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ