DivxDecode
Hookoff
Hookon
InitializeDivxDecoder
SetOutputFormat
UnInitializeDivxDecoder
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
bd05867914ac5ae71e43a54c9374240d.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bd05867914ac5ae71e43a54c9374240d.dll
Resource
win10v2004-20240226-en
Target
bd05867914ac5ae71e43a54c9374240d
Size
20KB
MD5
bd05867914ac5ae71e43a54c9374240d
SHA1
ee059491dddec5004db95327b831b7d2aad1bc2d
SHA256
15becf4b0f68fc89083a9ac62a616c0f29d260a7cdab9cc5aa0bb738c54466ed
SHA512
6d4a28abd6e9b6883e463f1449ef5b3f0aa8e77ab6ddd5352afb7d022449f2ef32f15146c103b6727949770fc6e50aa4eb49b3bb986cbd3968fc63fe6091c807
SSDEEP
384:VQYTFxIorE9cIgwAe+1iM/hBI2v7qmEukcXl/h/qp4n9:VndE9eMMJZdE4Z/qp49
Checks for missing Authenticode signature.
resource |
---|
bd05867914ac5ae71e43a54c9374240d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualProtect
Sleep
lstrcmpA
lstrcpyA
lstrcatA
ExitProcess
lstrcmpiA
lstrlenA
GetTickCount
lstrcpynA
GetModuleHandleA
VirtualAlloc
GetPrivateProfileIntA
GetSystemTime
WritePrivateProfileStringA
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
ReadFile
CreateFileA
CreateThread
SetFilePointer
GetModuleFileNameA
UnmapViewOfFile
OutputDebugStringA
LoadLibraryA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
RtlUnwind
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
CallNextHookEx
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenUrlA
shutdown
DivxDecode
Hookoff
Hookon
InitializeDivxDecoder
SetOutputFormat
UnInitializeDivxDecoder
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ