BITSAlloc
BITSFree
BITSServiceMain
BytesRemainingInCurrentRange
CNestedImpersonation
CalculateBytesTotal
DllRegisterServer
DllUnregisterServer
EmptyString
Find
FindInterfaceIndex
GetSubRanges
HostFromProxyDescription
MyLive
PROXY_SETTINGS_CONTAINER
Static task
static1
Behavioral task
behavioral1
Sample
b840f8fa5c59e7e534ff606b24c22e08.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b840f8fa5c59e7e534ff606b24c22e08.dll
Resource
win10v2004-20240226-en
Target
b840f8fa5c59e7e534ff606b24c22e08
Size
99KB
MD5
b840f8fa5c59e7e534ff606b24c22e08
SHA1
058b00cbbd3cab50210fb94de8f2f92690965d71
SHA256
cdedce178c16fd2671208972c3c5ff91411c368870dc27c860355c5340fc78fb
SHA512
3e767767619c89497bcf575e3973b6298458ab2e0d00ecb73fd4f9c478fb3bad1f7ba40f383d839559054b11dc151c445c31531731b8b0845f2234295627471c
SSDEEP
1536:fLYtDzR6wgw6lpVqiyxX04mR4spkdTlGjFJU6dpcoXzfqG8PPU4kNYg9IJOBB:fEDzR6wYlaiyNjEvdpDXTqG8PPU4kdiQ
Checks for missing Authenticode signature.
resource |
---|
b840f8fa5c59e7e534ff606b24c22e08 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
GetProcAddress
LoadLibraryA
VirtualAlloc
WaitForSingleObject
ResetEvent
SetEvent
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateProcessA
GetDiskFreeSpaceExA
FindClose
LocalFree
LocalReAlloc
LocalAlloc
RemoveDirectoryA
CreateFileA
ReadFile
WriteFile
MoveFileA
SetLastError
GetCurrentProcess
CreateRemoteThread
VirtualAllocEx
TerminateThread
GetLocalTime
GetTickCount
GlobalUnlock
GetSystemInfo
lstrcpyA
CloseHandle
RaiseException
memset
??2@YAPAXI@Z
memcmp
strchr
malloc
strcpy
strcmp
free
_except_handler3
strrchr
strcat
__CxxFrameHandler
atoi
strncmp
_errno
strtok
strncat
realloc
sprintf
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
strstr
strlen
_ftol
ceil
memmove
memcpy
strncpy
_strnicmp
??3@YAXPAX@Z
_strcmpi
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
ICSeqCompressFrame
ICSeqCompressFrameStart
BITSAlloc
BITSFree
BITSServiceMain
BytesRemainingInCurrentRange
CNestedImpersonation
CalculateBytesTotal
DllRegisterServer
DllUnregisterServer
EmptyString
Find
FindInterfaceIndex
GetSubRanges
HostFromProxyDescription
MyLive
PROXY_SETTINGS_CONTAINER
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ