IDP_CloseImage
IDP_GetImageInfo
IDP_GetPageInfo
IDP_GetPlugInInfo
IDP_Help
IDP_Init
IDP_OpenImage
IDP_OpenImageW
IDP_PageDecode
IDP_PageDecodeStart
IDP_PageDecodeStep
IDP_PageDecodeStop
IDP_ShowPlugInDialog
Static task
static1
Behavioral task
behavioral1
Sample
d103ccd324107c62195b5e25f5ac421a27d54aabef8ea14f2bb2373fd537c832.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d103ccd324107c62195b5e25f5ac421a27d54aabef8ea14f2bb2373fd537c832.dll
Resource
win10v2004-20231215-en
Target
d103ccd324107c62195b5e25f5ac421a27d54aabef8ea14f2bb2373fd537c832
Size
603KB
MD5
ed983b78d28b0a6a38345253bc4b84e4
SHA1
ed8166e653579b76048814b82737990c12f5b376
SHA256
d103ccd324107c62195b5e25f5ac421a27d54aabef8ea14f2bb2373fd537c832
SHA512
cd2cfb56290c6f1bb645f9bc7285c1522e1ff703332f0fdb317fde846fe8150eef84fd3d9a1ae58f4563a22749fed7202491d6fa1586919e96b0a9f2d6becc04
SSDEEP
3072:BMkjtMRTZsB3oTWde+2fKg8pf92tGGoY46SYB1ar1VmW0UQugYjqkFOd+H+Bdefz:6eK9ZsB3o5U2oh4BWjQuffevE39
Checks for missing Authenticode signature.
resource |
---|
d103ccd324107c62195b5e25f5ac421a27d54aabef8ea14f2bb2373fd537c832 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
LoadLibraryExA
ExpandEnvironmentStringsA
GetProcAddress
GetModuleHandleW
DisableThreadLibraryCalls
MultiByteToWideChar
lstrlenW
lstrcpynW
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetLastError
RaiseException
CloseHandle
WriteConsoleW
DecodePointer
GetTempPathW
WriteFile
GetTempFileNameW
DeleteFileW
CreateFileW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetFilePointerEx
LocalFree
WideCharToMultiByte
lstrcpyW
OutputDebugStringW
FindClose
GetTickCount
FreeLibrary
GetModuleFileNameW
QueryPerformanceCounter
GetACP
EncodePointer
EnterCriticalSection
LeaveCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
GetCPInfo
IsDebuggerPresent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
InterlockedFlushSList
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetWindowPos
GetParent
IsWindow
GetDlgItemTextW
CopyRect
FrameRect
FillRect
MessageBoxW
GetWindowRect
GetDC
GetSystemMetrics
SendDlgItemMessageW
SetDlgItemTextW
GetDlgItem
EndDialog
DialogBoxParamW
IsIconic
wsprintfW
LoadStringW
LoadStringA
InflateRect
GetDesktopWindow
ModifyWorldTransform
GetObjectW
DeleteEnhMetaFile
CreateEnhMetaFileW
CloseEnhMetaFile
SetTextColor
SetTextCharacterExtra
SetGraphicsMode
SetBkColor
TextOutW
DPtoLP
SetViewportOrgEx
SetWindowOrgEx
CreateSolidBrush
GetStockObject
GetTextMetricsW
SelectObject
SaveDC
RemoveFontResourceW
RestoreDC
GetTextExtentPoint32W
AddFontResourceW
CreateDCW
CreateFontIndirectW
DeleteDC
DeleteObject
EnumFontFamiliesExW
GetDeviceCaps
RegQueryValueExA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExA
PathFindExtensionW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
SysFreeString
IDP_CloseImage
IDP_GetImageInfo
IDP_GetPageInfo
IDP_GetPlugInInfo
IDP_Help
IDP_Init
IDP_OpenImage
IDP_OpenImageW
IDP_PageDecode
IDP_PageDecodeStart
IDP_PageDecodeStep
IDP_PageDecodeStop
IDP_ShowPlugInDialog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ