DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Uninstall
WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
8ce53e440792c40f2b5f8c926337c379.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ce53e440792c40f2b5f8c926337c379.dll
Resource
win10v2004-20231222-en
Target
8ce53e440792c40f2b5f8c926337c379
Size
64KB
MD5
8ce53e440792c40f2b5f8c926337c379
SHA1
7029f5d1a895ec9564a774c408c334fb25acca57
SHA256
52d540967202aa6e2069dd94711f926ac68ca8f67e90740b8734033546c3148a
SHA512
26717f84f262bfc94185dd42c44bc3ea0dd904422ed1e5c58c03d3f46d24876773bad519c9619ecce0c699ca52813b5e1f014a927286c5381a67465879a33f39
SSDEEP
768:+gySxDwCe4K+3tbtmVZIA/e65NE4eYoGc4JKkL0T3Mu/lWeuIKeunHeu/9Uguc7l:+4NS+dpmVc65Gahc4JKfMuraPhcuB
Checks for missing Authenticode signature.
resource |
---|
8ce53e440792c40f2b5f8c926337c379 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
recv
closesocket
WSCGetProviderPath
send
setsockopt
WSCDeinstallProvider
WSCInstallProvider
WSACleanup
WSCEnumProtocols
WSAStartup
socket
htons
gethostbyname
inet_addr
connect
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
ord941
ord939
ord4278
ord2763
ord6283
ord537
ord6055
ord1776
ord5290
ord3136
ord3402
ord4627
ord4424
ord5265
ord4376
ord4853
ord4998
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord5277
ord2982
ord3147
ord3259
ord4465
ord3262
ord2985
ord3081
ord4204
ord3830
ord3831
ord3825
ord3079
ord4080
ord4425
ord3597
ord641
ord1146
ord1168
ord567
ord324
ord2135
ord818
ord2302
ord4234
ord2086
ord6197
ord6380
ord4710
ord2688
ord6199
ord2379
ord755
ord470
ord1949
ord4034
ord4274
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord1116
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord3953
ord2725
ord1131
ord2764
ord540
ord2818
ord6663
ord800
ord1134
ord825
ord6467
ord2864
ord4299
ord6215
ord823
ord1105
ord533
ord5194
ord6392
ord1997
ord798
ord269
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord1197
ord1243
ord342
ord1182
ord1577
ord1575
ord1176
ord2976
ord3346
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_onexit
__dllonexit
_mbslwr
memcmp
printf
strchr
memcpy
strstr
memset
atoi
abs
strtok
strncpy
__CxxFrameHandler
strcmp
strcat
free
malloc
sprintf
isalnum
isspace
strcpy
strlen
GlobalAlloc
GlobalUnlock
GetProcAddress
LoadLibraryA
ExpandEnvironmentStringsA
GlobalLock
lstrlenA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
GetSystemTime
GetVersionExA
GetModuleFileNameA
FreeLibrary
Sleep
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
lstrcpyA
lstrcatA
LocalFree
LocalAlloc
GlobalFree
WinExec
GetTempFileNameA
GetDateFormatA
GetTempPathA
KillTimer
EnableWindow
MessageBoxA
CharNextA
SetTimer
SendMessageA
LoadIconA
GetWindowRect
GetClientRect
GetDesktopWindow
SetActiveWindow
UpdateWindow
GetMessageA
GetForegroundWindow
DispatchMessageA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegCreateKeyA
RegEnumKeyA
RegDeleteKeyA
CoCreateInstance
CoInitialize
RegisterTypeLi
SysAllocString
SysFreeString
SysStringLen
LoadTypeLi
SysAllocStringLen
GetAdaptersInfo
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Uninstall
WSPStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ