PdiInst
PdiRun
PdiShutdown
PdiStartup
PdiTest
Static task
static1
Behavioral task
behavioral1
Sample
11d354f1e6d2121170d418a4a9080f92.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11d354f1e6d2121170d418a4a9080f92.dll
Resource
win10v2004-20231215-en
Target
11d354f1e6d2121170d418a4a9080f92
Size
33KB
MD5
11d354f1e6d2121170d418a4a9080f92
SHA1
fee5c1bb019fea6297acf3df4f9d70f3b639ecf7
SHA256
0d171fbef5a9e17c4320006ecc4264f5edff45fb3949c1926ff844d97c3cae33
SHA512
0f214d0580be03a2cf6133be5396d2df9d7dd97eb85a1c69b2449d37e726ed3dbc0f735d0d933c949aa64f6bbbe1f56d401b2966338a8c2fe6391b09bf610429
SSDEEP
768:1lVUu0G4LuSUphCuoPLz7klRtipTxB5uG52:1lVz0GcuxsoiTF
Checks for missing Authenticode signature.
resource |
---|
11d354f1e6d2121170d418a4a9080f92 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetTempPathA
lstrlenA
GetSystemTime
lstrcatA
lstrcpynA
CreateThread
GetLastError
WaitForSingleObject
MoveFileA
GetVolumeInformationA
lstrcmpA
CreateEventA
GetLocaleInfoA
MoveFileExA
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
SystemTimeToFileTime
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
lstrcpyA
CreateFileA
GetWindowsDirectoryA
LoadLibraryA
GetFileSize
WritePrivateProfileStringA
OpenProcess
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
HeapAlloc
DeleteFileA
HeapFree
GetProcessHeap
GetThreadContext
SetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
GetVersion
Sleep
ExitProcess
CloseHandle
CreateMutexA
GetModuleFileNameA
WriteFile
FindAtomA
GetLocalTime
VirtualFree
GetTickCount
IsDebuggerPresent
GetThreadDesktop
SetThreadDesktop
CloseDesktop
OpenInputDesktop
FindWindowExA
FindWindowA
DispatchMessageA
GetMessageA
GetWindowThreadProcessId
GetWindowRect
CreateWindowExA
RegisterClassExA
DefWindowProcA
SetWindowsHookExA
GetFocus
GetCursorPos
EqualRect
TranslateMessage
IsWindowVisible
InflateRect
LoadCursorA
LoadIconA
CallNextHookEx
GetCaretPos
PostMessageA
wsprintfA
ClientToScreen
OpenProcessToken
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
RegEnumValueA
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
PdiInst
PdiRun
PdiShutdown
PdiStartup
PdiTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ