GetDLlVersion
Prevx1
Run
Static task
static1
Behavioral task
behavioral1
Sample
a33d3f19dae7970a8341803710c0e0df.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a33d3f19dae7970a8341803710c0e0df.dll
Resource
win10v2004-20240221-en
Target
a33d3f19dae7970a8341803710c0e0df
Size
56KB
MD5
a33d3f19dae7970a8341803710c0e0df
SHA1
52d73a7c8dcd3026ca625e267fd4ec4ae0749857
SHA256
a23d6f0d6904686b66a0cb223a21273e752276d89f3c8857aa6f095ffd0d7bb1
SHA512
36a4193fb4a708df80f56fbb0a1433e4813e47a6323b9be5635b1f34bac2993f3efe26768157e1c911bf455c6cea71411c4811558b9e6a093d8a663c4ce2335c
SSDEEP
768:kdwriX23a23By5kQ80Y3hT21SV9VV9qSQ4AGtfiB9IsidP40zgKXk5TsQ0WDi:kdUq2Ki0ahTKmVV9qS8G9R7WsYi
Checks for missing Authenticode signature.
resource |
---|
a33d3f19dae7970a8341803710c0e0df |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteFileA
TerminateProcess
GetLastError
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
CreateProcessA
SetEnvironmentVariableA
Sleep
RtlUnwind
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
CloseHandle
WriteFile
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetProcAddress
GetModuleHandleA
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetFilePointer
SendMessageA
GetWindowThreadProcessId
GetClassNameA
GetParent
CloseDesktop
SetForegroundWindow
EnumDesktopWindows
PostMessageA
CreateDesktopA
OpenDesktopA
EnumChildWindows
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
SHGetSpecialFolderPathA
WSACleanup
gethostbyname
WSAStartup
connect
setsockopt
socket
htons
send
recv
closesocket
shutdown
inet_addr
GetDLlVersion
Prevx1
Run
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ