DllGetClassObject
EventStartup
Static task
static1
Behavioral task
behavioral1
Sample
c444d8fbbc2644b73d506a91cd88625f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c444d8fbbc2644b73d506a91cd88625f.dll
Resource
win10v2004-20240226-en
Target
c444d8fbbc2644b73d506a91cd88625f
Size
132KB
MD5
c444d8fbbc2644b73d506a91cd88625f
SHA1
d692626b77cffebd362d4ff5206db6b7e7211116
SHA256
540453f6d664ad48315681076777c846986c105483163c1fff001f7f5d7e71ad
SHA512
41358137e638f1ffd95356e666b224a0fa7aa9d1e3e825f3136ca1989c8179d2d4fe5874518e7aae716adf7ceda3c1c4746d9208a26dee361e77c55cc1fc9073
SSDEEP
3072:f+UoWJchAdvNIF4ktORakv3nOY3TBfCeZeTdw/gQyVI:RKAdK4JXx3TBqHC/3MI
Checks for missing Authenticode signature.
resource |
---|
c444d8fbbc2644b73d506a91cd88625f |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_snprintf
_strnicmp
strlen
strstr
_stricmp
memcmp
atoi
_itoa
memcpy
_ultoa
tolower
memset
_chkstk
_allmul
_alldiv
strtok
WSASocketW
listen
WSASend
WSAGetLastError
WSAWaitForMultipleEvents
WSAIoctl
setsockopt
bind
closesocket
WSARecv
WSACreateEvent
WSAGetOverlappedResult
ntohl
WSASetLastError
getsockname
ntohs
shutdown
WSAStartup
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
InternetConnectA
InternetSetOptionA
HttpAddRequestHeadersA
SysAllocString
SysFreeString
PathFileExistsA
WaitForMultipleObjects
GetVolumeInformationA
GetWindowsDirectoryA
GetFileTime
RemoveDirectoryA
TransactNamedPipe
HeapSetInformation
HeapCreate
FindFirstFileA
HeapDestroy
HeapFree
WaitNamedPipeA
FindNextFileA
SetNamedPipeHandleState
HeapAlloc
GetSystemDirectoryA
GetVersionExA
FindClose
FreeLibrary
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
ExitProcess
GetFileAttributesExA
SetFileAttributesA
CreateDirectoryA
TlsSetValue
TlsGetValue
TlsAlloc
InterlockedExchange
CreateEventA
ProcessIdToSessionId
Process32Next
Process32First
WriteProcessMemory
VirtualAllocEx
Thread32Next
GetModuleHandleA
Thread32First
CreateToolhelp32Snapshot
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GetProcAddress
CloseHandle
OpenThread
GetCurrentProcessId
GetFileSize
lstrcpyA
ReadFile
GetModuleFileNameA
GetModuleFileNameW
InitializeCriticalSection
ResetEvent
lstrcatA
GetLocalTime
WaitForSingleObject
OpenMutexA
InterlockedCompareExchange
lstrlenA
CreateMutexA
SetEvent
TerminateThread
Sleep
OutputDebugStringA
DuplicateHandle
GetExitCodeThread
FlushFileBuffers
ReleaseMutex
OpenEventA
SetUnhandledExceptionFilter
LeaveCriticalSection
GetCurrentThread
VirtualFree
GetLastError
GetFileInformationByHandle
SystemTimeToFileTime
lstrcmpiA
GetSystemTime
GetCurrentProcess
WriteFile
EnterCriticalSection
CreateFileA
CreateThread
VirtualFreeEx
DisconnectNamedPipe
CreateNamedPipeA
ConnectNamedPipe
PeekNamedPipe
lstrcmpA
SetFilePointer
SetEndOfFile
GetTempFileNameA
DeleteCriticalSection
GetTempPathA
FlushInstructionCache
VirtualQuery
VirtualAlloc
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
VirtualProtect
SetLastError
lstrcmpW
MultiByteToWideChar
DeleteFileA
CreateProcessA
GetTickCount
GetFileAttributesA
LoadLibraryA
CreateRemoteThread
OpenProcess
SetForegroundWindow
ShowWindow
PeekMessageA
WaitForInputIdle
MsgWaitForMultipleObjects
GetSystemMetrics
wsprintfA
DispatchMessageA
OpenSCManagerA
CloseServiceHandle
OpenServiceA
ControlService
ChangeServiceConfigA
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
ShellExecuteA
SHGetFolderPathA
CoUninitialize
CoInitializeEx
CoCreateInstance
DllGetClassObject
EventStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ