DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
12cd5844b6461b42c2ac31e66d8edaf6.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
12cd5844b6461b42c2ac31e66d8edaf6.dll
Resource
win10v2004-20231222-en
Target
12cd5844b6461b42c2ac31e66d8edaf6
Size
236KB
MD5
12cd5844b6461b42c2ac31e66d8edaf6
SHA1
4ebafe47526dbd9a107e5ca0ff8c218576e90e2c
SHA256
565689bafd405c1ecea79e434069ddc36ec482bab0b968eb57c528e80ef69e53
SHA512
c073f8ab82cba9417c673dd61c30dc1b59ffa2e27596fece191376136de61eba9de711a086d2149cdf4f1977d541dd9e618bc1d366cdf959b565ea0f7a5aaaa2
SSDEEP
3072:ART+V0SFseNgnBRVP05ksNPw6TrsAkZ9oJcJaIaPgZAk1NVvtRATk:Ad+VdFse6RVPEkMwMTcdbZAk1NtGk
Checks for missing Authenticode signature.
resource |
---|
12cd5844b6461b42c2ac31e66d8edaf6 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
FreeLibrary
lstrcmpiW
LoadLibraryExW
GetModuleHandleW
CreateFileW
DeleteFileA
FlushFileBuffers
GetCurrentProcessId
GetFileAttributesW
GetLastError
VirtualQuery
LoadLibraryW
GetProcAddress
lstrlenA
lstrcpyA
GetTempPathA
GetTempFileNameW
WideCharToMultiByte
CreateMutexW
GetCurrentProcess
GlobalLock
OpenProcess
Sleep
lstrcmpW
GlobalUnlock
EnterCriticalSection
InterlockedExchangeAdd
DuplicateHandle
ReadFile
SetFilePointer
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
MultiByteToWideChar
RaiseException
DeleteCriticalSection
FindResourceExW
LoadResource
LockResource
GetVersionExW
SizeofResource
GetModuleFileNameW
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
GetModuleHandleA
GetModuleFileNameA
FindResourceW
lstrlenW
OpenMutexW
GetTimeZoneInformation
GetDateFormatA
GetTimeFormatA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
GetCommandLineA
GetCurrentThreadId
GetSystemInfo
VirtualAlloc
VirtualProtect
GetSystemTimeAsFileTime
GetConsoleMode
GetConsoleCP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
GetStartupInfoA
SetHandleCount
GetFileType
LCMapStringW
LCMapStringA
GetOEMCP
GetCPInfo
GetStdHandle
HeapCreate
VirtualFree
ExitProcess
SetLastError
HeapAlloc
HeapDestroy
TlsFree
SetWindowLongW
SetTimer
KillTimer
GetParent
CallWindowProcW
CharNextW
UnhookWindowsHookEx
GetWindow
GetClassNameW
FindWindowExW
GetWindowLongW
GetKeyboardLayout
GetTopWindow
SendMessageW
UnregisterClassA
PtInRect
RegisterWindowMessageW
DeleteObject
StretchBlt
SelectObject
DeleteDC
CreateCompatibleDC
CreateDIBSection
GetObjectW
GetDIBColorTable
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
SysAllocString
VariantChangeType
SysReAllocStringLen
SafeArrayUnlock
SafeArrayLock
SafeArrayDestroy
DispCallFunc
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetVartype
LoadRegTypeLi
SysStringLen
VarBstrCat
VarBstrCmp
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
VariantCopy
VariantClear
VariantInit
SysFreeString
VarUI4FromStr
LoadTypeLi
PathFindExtensionW
GdipCreateBitmapFromScan0
GdiplusStartup
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipFree
GdiplusShutdown
GdipSaveImageToFile
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipAlloc
GdipCloneImage
TransparentBlt
AlphaBlend
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ