DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Hp8x6
Static task
static1
Behavioral task
behavioral1
Sample
c0fd22ea3105d48326468b31d3a314ad.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c0fd22ea3105d48326468b31d3a314ad.dll
Resource
win10v2004-20240226-en
Target
c0fd22ea3105d48326468b31d3a314ad
Size
41KB
MD5
c0fd22ea3105d48326468b31d3a314ad
SHA1
f2a13117454a3b79473c2ff834c222372a936f8c
SHA256
44f8dbabb74dd5ddacbf69e4cdf6a5906f887b49d031732690da30ec6d59f71b
SHA512
a03b3849de793adb85814e2acfee419c166885f9ee5f1f1cd23e348df1b261a8381ac650fa2cf78d68781a4bd53ddd00000aea8de5456e131e89a5836d476457
SSDEEP
768:TIcojxsfKDYSZMsVmTjq7HIcojxsfKDY:pZfunMtTOxZfu
Checks for missing Authenticode signature.
resource |
---|
c0fd22ea3105d48326468b31d3a314ad |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageDirectoryEntryToData
GetModuleFileNameA
MapViewOfFile
OpenFileMappingA
lstrcmpA
DisableThreadLibraryCalls
HeapAlloc
GetSystemInfo
HeapCreate
GetVersion
CreateFileMappingA
InitializeCriticalSection
DeleteCriticalSection
Sleep
InterlockedIncrement
GetProcAddress
GetCurrentProcessId
lstrlenW
UnmapViewOfFile
ReadFile
WriteFile
OpenFile
GetSystemDirectoryA
GlobalUnlock
GlobalLock
DebugBreak
HeapFree
lstrcpyA
lstrlenA
GetModuleHandleA
lstrcmpiA
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
CreateToolhelp32Snapshot
Module32First
Module32Next
CloseHandle
EnterCriticalSection
InterlockedDecrement
LeaveCriticalSection
GetFileSize
RtlUnwind
FindWindowA
SetWindowsHookExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
DragQueryFileA
ShellExecuteA
ReleaseStgMedium
LoadRegTypeLi
SysFreeString
SysStringLen
ord23
ord16
ord15
ord18
ord57
ord32
ord58
ord30
ord21
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Hp8x6
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ