?COMWndProc@@YGJPAUHWND__@@IIJ@Z
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
1212e3aea885b625bb2cedbd1f1e73c7.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1212e3aea885b625bb2cedbd1f1e73c7.dll
Resource
win10v2004-20231215-en
Target
1212e3aea885b625bb2cedbd1f1e73c7
Size
299KB
MD5
1212e3aea885b625bb2cedbd1f1e73c7
SHA1
203e6f5c70bcb9eedff705f879c4bb3ddd0593e9
SHA256
cc711235cceb2bcc3f7aab910dadbfd355dcd1686f4ff754d27e78bf54ae0a20
SHA512
7df970cff0cf9a4b0ffd911060bda0bd1c614b395aef330bd8ecde2a6e26711a7425d41cf76b15a4eaff4f7ddce071fa06f47f00b1fb669dfa2fef4884ce31fa
SSDEEP
6144:6aZQa6x1nn3z7DiNngZYYlnRO1yovrJGIgCSQTwCf:6LnnDiNgZLlSvyHCf
Checks for missing Authenticode signature.
resource |
---|
1212e3aea885b625bb2cedbd1f1e73c7 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHDeleteKeyA
SHGetFolderPathW
FormatMessageA
GetVersion
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetPrivateProfileSectionNamesA
FindClose
FindNextFileA
DeleteFileA
ReleaseMutex
FindFirstFileA
CreateMutexA
ReadFile
LocalReAlloc
LocalSize
LocalUnlock
LocalLock
lstrcpynA
LoadLibraryA
GetWindowsDirectoryW
CreateDirectoryA
GetFileAttributesA
GetShortPathNameA
RemoveDirectoryA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedExchange
HeapSize
HeapReAlloc
HeapDestroy
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
OutputDebugStringA
InterlockedCompareExchange
GetSystemDirectoryW
GetThreadLocale
SetThreadLocale
SetEvent
LoadLibraryExA
FreeLibrary
IsDBCSLeadByte
CreateEventA
CreateThread
GetModuleHandleA
GetModuleHandleW
GetProcAddress
WaitForSingleObject
CloseHandle
Sleep
lstrcmpiA
FindResourceExA
GetComputerNameA
GlobalAddAtomA
GetLastError
LocalAlloc
GetPrivateProfileStringA
GetPrivateProfileIntA
LocalFree
WritePrivateProfileStringA
SetLastError
GetModuleFileNameA
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalGetAtomNameA
GetSystemTimeAsFileTime
GetCurrentThreadId
MultiByteToWideChar
GetCurrentProcess
FlushInstructionCache
FindResourceA
LoadResource
CreateFileA
SetFilePointer
WriteFile
lstrcpyA
GetTickCount
HeapFree
MulDiv
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentProcessId
SetErrorMode
ReleaseDC
GetWindow
GetClassNameA
GetWindowTextLengthA
SetWindowLongA
IsWindow
GetClassInfoExA
LoadCursorA
DestroyWindow
DefWindowProcA
RegisterClassExA
CreateWindowExA
GetWindowLongA
CallWindowProcA
RegisterWindowMessageA
PostMessageA
UnregisterClassA
CharNextA
CharNextW
DispatchMessageA
TranslateMessage
GetMessageA
PostThreadMessageA
LoadStringA
MessageBoxA
wsprintfA
EnableWindow
IsWindowEnabled
GetDlgItem
SetRect
GetSystemMetrics
SystemParametersInfoA
SetWindowPos
GetParent
GetWindowRect
GetDC
PeekMessageA
PostQuitMessage
MsgWaitForMultipleObjects
ShowWindow
IsIconic
SetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
RegisterClassA
SetMenuItemInfoA
GetMenuItemInfoA
GetMenuItemCount
SetWindowTextA
GetWindowTextA
GetObjectA
SelectObject
GetTextMetricsA
GetDeviceCaps
CreateFontIndirectA
GetStockObject
GetSecurityDescriptorControl
GetSidSubAuthority
CopySid
IsValidSid
GetLengthSid
SetNamedSecurityInfoA
InitializeAcl
AddAce
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetSidLengthRequired
RegEnumKeyA
RegEnumValueA
GetAce
GetAclInformation
GetNamedSecurityInfoA
MakeAbsoluteSD
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
InitializeSecurityDescriptor
RegDeleteKeyA
RegDeleteValueA
RegQueryInfoKeyA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
SetServiceStatus
CloseServiceHandle
OpenServiceA
OpenSCManagerA
QueryServiceStatus
ControlService
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RegEnumKeyExA
CreateServiceA
DeleteService
RegisterServiceCtrlHandlerA
RegQueryValueExW
RegEnumValueW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
InitializeSid
CoCreateInstance
CLSIDFromString
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
CoInitialize
CoUninitialize
CoInitializeSecurity
GetRunningObjectTable
MkParseDisplayName
CreateBindCtx
ProgIDFromCLSID
CoGetInstanceFromFile
CreateFileMoniker
CreateErrorInfo
SetErrorInfo
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
VariantInit
VariantCopy
LoadTypeLi
SysStringLen
LoadRegTypeLi
SysStringByteLen
SysAllocStringByteLen
SysAllocString
VariantClear
VarBstrCmp
SysAllocStringLen
VarBstrCat
SysFreeString
GetErrorInfo
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
__clean_type_info_names_internal
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
_except_handler4_common
isxdigit
iswctype
toupper
_chdrive
_chdir
_getcwd
isdigit
_mbschr
atoi
wcscpy_s
_beginthreadex
wcslen
_wtoi
_purecall
vsprintf_s
_vscprintf
_vsnprintf_s
puts
wcscmp
strcat_s
wcsncpy_s
_mbsicmp
_mbsstr
strcpy_s
memmove_s
strlen
_ltoa_s
_mbsnbcpy_s
_invalid_parameter_noinfo
memcmp
_resetstkoflw
malloc
_itoa_s
??_V@YAXPAX@Z
_wcsicmp
??2@YAPAXI@Z
??0exception@std@@QAE@ABV01@@Z
__CxxFrameHandler3
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
sprintf_s
memcpy_s
_CxxThrowException
free
??3@YAXPAX@Z
_recalloc
calloc
wcschr
memset
atol
?COMWndProc@@YGJPAUHWND__@@IIJ@Z
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ