OQmqXZVZk
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
Binary.CPWLHxpA.dll
Resource
win10v2004-20230703-en
Target
Binary.CPWLHxpA.dll
Size
5.6MB
MD5
1669dc15266c4336499eceefe7f9d157
SHA1
7296e40ad12f1fc0bacbee66199819fa034d41b4
SHA256
fed4c8d6bd9066d07dbb63cadf51fe3d32712256b76a645bbf95527fe227d82d
SHA512
49de51cf3a458fdc5c54454dd81998429ad8998f8a9501d17bfc079705b83b8c26b99412c5be4115f29bffd2c88c5fddcc66b349cd68de712451688d189bd1d0
SSDEEP
98304:SGWdi/3Srb7achAzgpDP/mcrdpTsrvxhzMT08tpEa4K4uFlghiaXjsfONDv/8yZe:edqSr3aEpDP/mcr/TYphq8jeldNmzNTe
Checks for missing Authenticode signature.
resource |
---|
Binary.CPWLHxpA.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
FlatSB_SetScrollInfo
Shell_NotifyIconW
CopyImage
GetFileVersionInfoSizeW
SafeArrayPutElement
RegEnumKeyExW
NetWkstaGetInfo
memcpy
WinHttpGetIEProxyConfigForCurrentUser
GetVersion
GetVersionExW
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
CreateBindCtx
Pie
OQmqXZVZk
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ