DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
e12ffa6b6876e8cd2e98b7393034cc96.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e12ffa6b6876e8cd2e98b7393034cc96.dll
Resource
win10v2004-20231215-en
Target
e12ffa6b6876e8cd2e98b7393034cc96
Size
18KB
MD5
e12ffa6b6876e8cd2e98b7393034cc96
SHA1
78c5dc6897e22b6af5d286f794ebb9db207b7249
SHA256
88eb7a3458768137e317dbd8adf88b72adbf53370c0ec94e8362157a3b39e679
SHA512
651ad8bdd7bfbb600eaba8f25a3d4241d69d8844b731cc33ed28b018e08e5cb068ebd56effef9a40c21f9034e64842f71ea4b5d8cca2de1a029edc5b1f0e5616
SSDEEP
384:8TKir1i/8WaBn6igjVJGBoe4p2lQb5fx69HOZFC:OKig//CWJGBxXebn69uj
Checks for missing Authenticode signature.
resource |
---|
e12ffa6b6876e8cd2e98b7393034cc96 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
UuidToStringA
htons
InternetCrackUrlA
SHDeleteKeyA
ObtainUserAgentString
IsWindowVisible
CoTaskMemFree
VariantClear
ord58
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
_purecall
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE