DllCanUnloadNow
DllGetClassObject
DllPreTranslateMessage
Static task
static1
Behavioral task
behavioral1
Sample
06c33545ac144ff0c0655a364098483d.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06c33545ac144ff0c0655a364098483d.dll
Resource
win10v2004-20231222-en
Target
06c33545ac144ff0c0655a364098483d
Size
61KB
MD5
06c33545ac144ff0c0655a364098483d
SHA1
096c1d06fbe862920714b0df1229caf5d9cab5d4
SHA256
7f8b1f53af9226bcec8964a3f493b8d64ca1446cd75e5ec0bc6777fe33fee4e7
SHA512
2e836e6060821bf86ed90e8363497ba55650760e76469472e9e73d1e6fa67017f8009112182a0559aeb5bc0480bb2381eee74416d24a53987f05130a7b8e5572
SSDEEP
1536:qCOhvV3LWAxkjM9rh6jKHL3ziiq4efPgMt+kC:4h8BjMdJzfq4UFC
Checks for missing Authenticode signature.
resource |
---|
06c33545ac144ff0c0655a364098483d |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CoInitialize
StgOpenStorage
CoUninitialize
GetProcessWindowStation
GetUserObjectInformationA
CloseWindowStation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetModuleFileNameExA
_adjust_fdiv
malloc
free
_snprintf
_memicmp
memcpy
strrchr
memset
_initterm
GetLastError
InterlockedIncrement
CreateFileMappingA
MapViewOfFile
DisableThreadLibraryCalls
OpenFileMappingA
CreateMutexA
UnmapViewOfFile
CreateThread
VirtualAlloc
LoadLibraryA
GetProcAddress
OpenProcess
TerminateProcess
CloseHandle
IsBadReadPtr
lstrcpyA
GetFileAttributesA
MultiByteToWideChar
VirtualFree
LocalAlloc
LocalFree
DllCanUnloadNow
DllGetClassObject
DllPreTranslateMessage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ