DllCanUnloadNow
DllGetClassObject
IAlloc
QueueMemory
Static task
static1
Behavioral task
behavioral1
Sample
12dd94ad295f6475b580ee3eb0c54c58.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12dd94ad295f6475b580ee3eb0c54c58.dll
Resource
win10v2004-20231215-en
Target
12dd94ad295f6475b580ee3eb0c54c58
Size
1.4MB
MD5
12dd94ad295f6475b580ee3eb0c54c58
SHA1
7e342a02f95c42610a2146cbcdc2e50cef03318c
SHA256
3611c30b38189fc59ae584836ae56b279bb645e139cc272ae85508c6e9558262
SHA512
04538dd40fdb9ed6df5aaaf762443517bc049e62e4b0e09e831516a1690bbff50c38a23989a1b924c97c150a8c4bd5b14e3676d5fe4bdbad2c2db87b7b4345b9
SSDEEP
6144:jh9DuYPcgSkIS1E95GaOo+D7TXv3pBqhTIY1doUgbnnMoYZ00DVC8eEuh00mfneG:tnJdnODOFp1wuk00s8e0DTDoSrgW
Checks for missing Authenticode signature.
resource |
---|
12dd94ad295f6475b580ee3eb0c54c58 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetACP
OpenProcess
GetCurrentThread
DuplicateHandle
FlushFileBuffers
ReleaseMutex
CreateMutexA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FormatMessageA
WaitForMultipleObjects
OpenEventA
ResetEvent
GetVolumeInformationA
GetVersionExA
RemoveDirectoryA
DeviceIoControl
FileTimeToSystemTime
FileTimeToLocalFileTime
CreateDirectoryA
GetWindowsDirectoryA
GetProcessHeap
GetFullPathNameA
LocalFree
GetShortPathNameA
TerminateProcess
CompareStringW
CompareStringA
WriteConsoleW
GetComputerNameA
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
HeapSize
HeapReAlloc
VirtualAlloc
VirtualFree
ExitProcess
GetStdHandle
LCMapStringW
LCMapStringA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCommandLineA
GetDateFormatA
GetTimeFormatA
RaiseException
GetDriveTypeA
CreateThread
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
GetTimeZoneInformation
GetLocalTime
GetCurrentProcess
HeapDestroy
SetEnvironmentVariableA
HeapCreate
HeapFree
HeapAlloc
GetModuleFileNameA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
GetCurrentProcessId
DisableThreadLibraryCalls
SetLastError
SetThreadPriority
TerminateThread
GetFileTime
SetFileTime
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetFileAttributesA
SetFileAttributesA
FindNextFileA
FindClose
GetModuleHandleA
GetLastError
InitializeCriticalSection
CreateEventA
ResumeThread
SetEvent
InterlockedIncrement
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
DeleteCriticalSection
GetDiskFreeSpaceA
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
MoveFileA
DeleteFileA
GetVersion
GetSystemDirectoryA
GetTickCount
WriteFile
CreateFileA
ReadFile
SetFilePointer
CloseHandle
GetConsoleOutputCP
VirtualProtect
ExitWindowsEx
EnumDisplaySettingsA
PostQuitMessage
UnregisterHotKey
RegisterHotKey
LoadCursorA
ToAsciiEx
GetKeyboardLayout
CreatePopupMenu
PostMessageA
wsprintfA
GetForegroundWindow
GetCursorPos
SetWindowLongA
IsWindow
DefWindowProcA
GetWindowLongA
CreateWindowExA
GetSystemMetrics
AppendMenuA
TrackPopupMenu
DestroyMenu
LoadImageA
SetTimer
GetDesktopWindow
EnumWindows
GetKeyNameTextA
GetKeyState
GetAsyncKeyState
FindWindowA
GetWindowThreadProcessId
OpenDesktopA
OpenInputDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
GetUserObjectInformationA
SetThreadDesktop
SetProcessWindowStation
CloseDesktop
CloseWindowStation
MessageBoxA
LoadStringA
SendMessageA
DialogBoxParamA
SetDlgItemTextA
SetPropA
SetForegroundWindow
EndDialog
PostThreadMessageA
GetClassNameA
GetWindowRect
GetDC
ReleaseDC
GetMessageA
TranslateMessage
DispatchMessageA
KillTimer
DestroyWindow
UnregisterClassA
RegisterClassA
LoadIconA
CreateCompatibleDC
CreateDIBSection
DeleteDC
GdiFlush
GetDeviceCaps
BitBlt
SelectObject
CreateCompatibleBitmap
CreateDCA
GetStockObject
DeleteObject
InitiateSystemShutdownA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
LogonUserA
RegEnumValueA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RevertToSelf
GetSidLengthRequired
GetTokenInformation
LookupAccountSidA
ImpersonateLoggedOnUser
DuplicateToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
Shell_NotifyIconA
SHLoadInProc
CoTaskMemFree
CoInitialize
CoUninitialize
StringFromCLSID
CoCreateInstance
SysFreeString
SysAllocStringLen
DllCanUnloadNow
DllGetClassObject
IAlloc
QueueMemory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ