GetDLlVersion
Run
Static task
static1
Behavioral task
behavioral1
Sample
8c42c87219282e23be87ab68512d1a2c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c42c87219282e23be87ab68512d1a2c.dll
Resource
win10v2004-20231222-en
Target
8c42c87219282e23be87ab68512d1a2c
Size
76KB
MD5
8c42c87219282e23be87ab68512d1a2c
SHA1
f10b153fca802650f0287f88c2e7916471a470ba
SHA256
4605c3cf119281a5fb5a387402cd0f156ed261d22abce5d0f12615ec31810c5f
SHA512
ca2c22acb50eb9a7e6847efe955db45db41383542311d4da3a3a6c52e7c60c3e5b5bde71ac718d954bf6f0e61c600e3e4f9182149d4e2d8d142a7dd9ad67f209
SSDEEP
1536:YGsdmIPoXo4o+cpRYTxSPhSFVyHwQnlX:pIQYJsgecnlX
Checks for missing Authenticode signature.
resource |
---|
8c42c87219282e23be87ab68512d1a2c |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteFileA
TerminateProcess
GetLastError
FindClose
FindNextFileA
FindFirstFileA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
CreateProcessA
SetEnvironmentVariableA
Sleep
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
SetFilePointer
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
CloseHandle
WriteFile
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetProcAddress
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SendMessageA
GetWindowThreadProcessId
GetClassNameA
GetParent
CloseDesktop
SetForegroundWindow
EnumDesktopWindows
PostMessageA
CreateDesktopA
EnumChildWindows
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
SHGetSpecialFolderPathA
gethostbyname
inet_addr
WSAStartup
connect
setsockopt
socket
htons
send
recv
closesocket
shutdown
WSACleanup
GetDLlVersion
Run
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ