DllUpdate
Install
MainThread
ServiceMain
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
f8b7d54000a54cd55795fb007363e1b2d1198596a81db2af39fd753c394fda1d.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f8b7d54000a54cd55795fb007363e1b2d1198596a81db2af39fd753c394fda1d.dll
Resource
win10v2004-20240426-en
Target
f8b7d54000a54cd55795fb007363e1b2d1198596a81db2af39fd753c394fda1d
Size
51KB
MD5
64e1707bdf982bc7ced899510cc5ce72
SHA1
1cc1526f21f3b029c0c78ccd1fcc980fcc218671
SHA256
f8b7d54000a54cd55795fb007363e1b2d1198596a81db2af39fd753c394fda1d
SHA512
64d5e7a8042988eec21324584606dd7fca2cb8125a384805c444c3bcff164fb697a758218040baeb15ab71a87de70732a25118eed287536aef5de7a00d5b0697
SSDEEP
768:3Er7XR1M6t6FikUE58ozVOB+6QcXn0cE5Y18BtrEZJjuSkwFOBezRsAMC6Hh4:3EXXM2HEhzVWKtrEZFxFOBOpMC6H
Checks for missing Authenticode signature.
resource |
---|
f8b7d54000a54cd55795fb007363e1b2d1198596a81db2af39fd753c394fda1d |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
ReadFile
GetFileAttributesA
LocalFree
LocalSize
LocalAlloc
WinExec
lstrcatA
GetCurrentProcessId
Process32Next
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
CopyFileA
GetModuleFileNameA
GlobalMemoryStatusEx
WaitForSingleObject
GetCurrentDirectoryA
FreeConsole
VirtualProtect
HeapFree
GetProcessHeap
HeapAlloc
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateThread
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileStringA
lstrcmpiA
SetEvent
CreateEventA
VirtualAlloc
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
lstrcpyA
lstrlenA
GetLastError
GetFileSize
CreateFileA
SetFilePointer
WriteFile
CloseHandle
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedCompareExchange
EncodePointer
DecodePointer
VirtualFree
wsprintfA
GetSystemMetrics
ChangeDisplaySettingsA
GetLastInputInfo
GetWindowThreadProcessId
RegSetValueExA
RegOpenKeyExA
CloseServiceHandle
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
RegCloseKey
SHGetSpecialFolderPathA
VariantInit
VariantClear
??2@YAPAXI@Z
memcpy
_CxxThrowException
memset
_local_unwind4
strrchr
strstr
??_U@YAPAXI@Z
strncpy
??_V@YAXPAX@Z
free
malloc
printf
rand
atoi
strcspn
wcstombs
realloc
_errno
strchr
_beginthreadex
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
__CppXcptFilter
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__clean_type_info_names_internal
??3@YAXPAX@Z
ceil
_strupr
_stricmp
__CxxFrameHandler3
_strnicmp
recvfrom
getpeername
accept
listen
htons
getsockname
inet_addr
gethostbyname
closesocket
WSAStartup
connect
WSACleanup
ntohs
inet_ntoa
select
__WSAFDIsSet
recv
send
sendto
socket
bind
GetIfTable
GetAdaptersInfo
DllUpdate
Install
MainThread
ServiceMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ