DllCanUnloadNow
DllGetClassObject
DllGetVersion
DllRegisterServer
DllStartup
DllUnregisterServer
InstallAppMon
ReleaseAppMon
Static task
static1
Behavioral task
behavioral1
Sample
2572c05be8d6af36ad58324e194495c5.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2572c05be8d6af36ad58324e194495c5.dll
Resource
win10v2004-20231215-en
Target
2572c05be8d6af36ad58324e194495c5
Size
164KB
MD5
2572c05be8d6af36ad58324e194495c5
SHA1
36b444d25ecc1ae745e647f726a730d91892d673
SHA256
e42d9b960cd29a96ecc8f5139503ac0001480d2824ec891a7a68475fc5b5a2cb
SHA512
f04fa6b932812d5beffe8cc2636bb505f642f838064c729db4419c7f7949b931d9d82a26aee28dcf7bfa436e4631d622a64f2a5bf1970dc7d6a337e4c50329b0
SSDEEP
3072:Z2XHIRCk+QWrxMtO7OlJxSw7aGPEglBrCedTH:a7xMtO7OlJxSwdBm
Checks for missing Authenticode signature.
resource |
---|
2572c05be8d6af36ad58324e194495c5 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHGetValueA
InternetGetConnectedState
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetSetOptionA
InternetReadFile
WSACleanup
gethostbyname
WSAStartup
IsDestinationReachableA
GetVersionExA
lstrlenW
WideCharToMultiByte
GetCurrentThreadId
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
lstrcatA
lstrcpyA
lstrlenA
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
VirtualQuery
WriteProcessMemory
GetProcAddress
VirtualProtect
lstrcmpiA
LoadLibraryA
GetSystemInfo
LocalFree
DisableThreadLibraryCalls
GetModuleFileNameA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
GetShortPathNameA
FindClose
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
lstrcpynA
GetWindowsDirectoryA
GetSystemDirectoryA
DebugBreak
OutputDebugStringA
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpA
FlushInstructionCache
GetLocaleInfoA
CreateThread
FreeLibrary
GetLastError
GetCurrentProcess
SendMessageA
IsWindowUnicode
GetWindowLongW
SetWindowLongW
GetWindowLongA
CallWindowProcA
ReleaseDC
SetWindowTextA
BeginPaint
GetDC
MapVirtualKeyA
keybd_event
GetClientRect
GetWindowTextA
SendMessageTimeoutA
PeekMessageA
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageA
SetWindowLongA
InvalidateRgn
InvalidateRect
SetCapture
ReleaseCapture
DestroyWindow
CreateAcceleratorTableA
GetDesktopWindow
RedrawWindow
IsWindow
SetWindowPos
GetSysColor
IsChild
SetFocus
DefWindowProcA
GetWindowTextLengthA
GetWindow
LoadCursorA
RegisterWindowMessageA
GetClassInfoExA
wvsprintfA
RegisterClassExA
FindWindowA
LoadStringA
CreateWindowExA
CharNextA
wsprintfA
GetParent
GetClassNameA
SetWindowsHookExA
UnhookWindowsHookEx
GetGUIThreadInfo
CallNextHookEx
GetKeyState
GetFocus
EndPaint
FillRect
GetDlgItem
ord253
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
CLSIDFromProgID
CoCreateInstance
CLSIDFromString
CoTaskMemFree
StringFromCLSID
CoTaskMemAlloc
OleLockRunning
CoUninitialize
CoInitialize
VariantClear
SysAllocStringLen
SysStringLen
SysAllocString
VariantCopy
LoadRegTypeLi
VariantChangeType
SysFreeString
VariantInit
GetStockObject
GetObjectA
CreateSolidBrush
DeleteDC
SelectObject
GetDeviceCaps
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
malloc
_adjust_fdiv
??1type_info@@UAE@XZ
_strupr
_initterm
atol
isalpha
strrchr
sscanf
mktime
localtime
isdigit
_mbsspn
difftime
_mbsnbcpy
_mbschr
_mbsnbcmp
atoi
_ismbcdigit
_mbscspn
_strcmpi
wcslen
memcmp
_purecall
_mbscmp
_mbsrchr
time
_mbslwr
fgets
strchr
strcmp
_ftol
strftime
strstr
fopen
_wcsicmp
memset
_mbsstr
memmove
memcpy
??2@YAPAXI@Z
_mbsicmp
_strnicmp
strcpy
strlen
strncpy
_wcsnicmp
wcschr
_onexit
fwrite
fclose
wcsstr
__CxxFrameHandler
fread
isalnum
strtok
strcat
_CxxThrowException
free
__dllonexit
?terminate@@YAXXZ
_except_handler3
ImageDirectoryEntryToData
DllCanUnloadNow
DllGetClassObject
DllGetVersion
DllRegisterServer
DllStartup
DllUnregisterServer
InstallAppMon
ReleaseAppMon
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ