TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
hZYMZiLEu
Static task
static1
Behavioral task
behavioral1
Sample
MSIE5A.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
MSIE5A.dll
Resource
win10v2004-20230703-en
Target
MSIE5A.dll
Size
5.5MB
MD5
55282c7d2a483cfa9cffd7752c0e0c88
SHA1
81325abb4b35d23b1ebae08b2febf325217ae353
SHA256
6c596efe9f4c63a592c0ad9e42c936151479c93d0f55731973723bb517e29a75
SHA512
f9604b5b54689964a51cb9fa752e9d28a31b26fe2e11fc2dfd14384a3085079f6d85113fcc60b899ff98ba7289e3ff16ef3bf9bdaa24027179df1e23bac27673
SSDEEP
98304:e3OtZdlWPDRabO7mev+fRh3/nwvuXD1jNmSER3bv+QSKpa8A2yxHXZUkGFWgNH8n:dtZdYPgbOi5Ma8b0KRNyxHWkyWX
Checks for missing Authenticode signature.
resource |
---|
MSIE5A.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
FlatSB_SetScrollInfo
Shell_NotifyIconW
CopyImage
GetFileVersionInfoSizeW
SafeArrayPutElement
RegEnumKeyExW
NetWkstaGetInfo
memcpy
WinHttpGetIEProxyConfigForCurrentUser
GetVersion
GetVersionExW
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
CreateBindCtx
Pie
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
hZYMZiLEu
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ