CheckForEnableAccessibility
IsMatch
Overview
overview
3Static
static
3Native/x64...er.dll
windows7-x64
1Native/x64...er.dll
windows10-2004-x64
1Native/x64...er.dll
windows7-x64
1Native/x64...er.dll
windows10-2004-x64
1Native/x64...or.exe
windows7-x64
1Native/x64...or.exe
windows10-2004-x64
1Native/x86...er.dll
windows7-x64
1Native/x86...er.dll
windows10-2004-x64
1Native/x86...er.dll
windows7-x64
1Native/x86...er.dll
windows10-2004-x64
1Native/x86...or.exe
windows7-x64
1Native/x86...or.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Native/x64/QtAccEnabler.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Native/x64/QtAccEnabler.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Native/x64/QtHelper.dll
Resource
win7-20231025-en
Behavioral task
behavioral4
Sample
Native/x64/QtHelper.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Native/x64/injector.exe
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
Native/x64/injector.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
Native/x86/QtAccEnabler.dll
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
Native/x86/QtAccEnabler.dll
Resource
win10v2004-20231025-en
Behavioral task
behavioral9
Sample
Native/x86/QtHelper.dll
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Native/x86/QtHelper.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Native/x86/injector.exe
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Native/x86/injector.exe
Resource
win10v2004-20231023-en
Target
625f3da45278f28454671a8f42d861d4e3f27e604e5767741be7e7e6f6c3ce59
Size
93KB
MD5
c4d232db6811e749d5a2460720856458
SHA1
db4697daf5be3ec3f9f516c0eaa38dad966433f5
SHA256
625f3da45278f28454671a8f42d861d4e3f27e604e5767741be7e7e6f6c3ce59
SHA512
0844adee4e559a7f8a46f6e827dd85618ef0cec25528f9bf559631cb6a0d7c61c2b46d08dfac1098ef649291c00ed1b7afe43835182b7ed3dfd33e46705e17ce
SSDEEP
1536:i2RduYF41lhuMG5UfT+1HSi5trAmtD1E1GnfQtovmWgJYzVR0yIs4FZLf86:iWdoJuMFfTfst0mtDlIomWJVR0y3YJv
Checks for missing Authenticode signature.
resource |
---|
unpack001/Native/x64/QtAccEnabler.dll |
unpack001/Native/x64/QtHelper.dll |
unpack001/Native/x64/injector.exe |
unpack001/Native/x86/QtAccEnabler.dll |
unpack001/Native/x86/QtHelper.dll |
unpack001/Native/x86/injector.exe |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
ReadProcessMemory
GetCurrentProcessId
CreateProcessW
GetModuleHandleW
FreeLibrary
CreateFileMappingW
OpenThread
VirtualQueryEx
GetExitCodeProcess
CreateThread
GetVersionExW
CreateRemoteThread
GetProcessId
LoadLibraryW
MapViewOfFile
CreateFileW
Module32NextW
Module32FirstW
CreateToolhelp32Snapshot
IsWow64Process
lstrlenW
VirtualFreeEx
SizeofResource
HeapFree
EnterCriticalSection
lstrcpynW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
GetFileAttributesW
HeapSize
GetExitCodeThread
FormatMessageW
GetFileAttributesExW
Process32NextW
LockResource
Process32FirstW
HeapReAlloc
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
HeapDestroy
DeleteCriticalSection
VerSetConditionMask
GetProcessHeap
VerifyVersionInfoW
lstrcmpiW
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
IsDebuggerPresent
GetProcAddress
CloseHandle
OutputDebugStringW
GetLastError
Sleep
MultiByteToWideChar
OpenProcess
UnmapViewOfFile
GetCurrentThreadId
WaitForSingleObject
TerminateProcess
DisableThreadLibraryCalls
GetCurrentProcess
SetLastError
WriteProcessMemory
MessageBoxA
GetUserObjectInformationW
GetActiveWindow
GetProcessWindowStation
GetLastActivePopup
SysFreeString
GetErrorInfo
NtSuspendProcess
NtResumeProcess
PathRemoveFileSpecW
PathIsRelativeW
__CxxFrameHandler4
_CxxThrowException
__std_exception_destroy
__std_exception_copy
memset
memmove
wcsstr
strchr
__std_terminate
__C_specific_handler
memcpy
wcsrchr
__std_type_info_destroy_list
_initialize_narrow_environment
_cexit
_initterm
_initterm_e
_configure_narrow_argv
_seh_filter_dll
_register_onexit_function
_errno
_initialize_onexit_table
_execute_onexit_table
_crt_atexit
_invalid_parameter_noinfo
fclose
__stdio_common_vswprintf
_wfopen
fread
__stdio_common_vswprintf_s
_wgetenv
_callnewh
malloc
_recalloc
calloc
free
wmemcpy_s
wcsncpy
strncpy
_wcsicmp
strncat
wcsncmp
CheckForEnableAccessibility
IsMatch
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
VirtualAllocEx
ExitProcess
GetModuleHandleW
FreeLibrary
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
GetVersionExW
LoadLibraryW
DeleteCriticalSection
GetModuleHandleExW
EncodePointer
InterlockedFlushSList
RtlUnwindEx
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RaiseException
IsDebuggerPresent
OutputDebugStringW
GetLastError
Sleep
GetCurrentThreadId
VirtualQuery
TerminateProcess
VirtualFree
SetLastError
VirtualProtect
WriteProcessMemory
GetProcAddress
GetModuleHandleA
GetCurrentProcess
DisableThreadLibraryCalls
GetCurrentProcessId
VirtualAlloc
MessageBoxA
GetUserObjectInformationW
GetWindowThreadProcessId
GetClassNameW
SendMessageW
EnumWindows
GetActiveWindow
GetLastActivePopup
GetProcessWindowStation
_amsg_exit
__DestructExceptionObject
_local_unwind
memcpy
realloc
_errno
memset
_stricmp
free
wcsncmp
malloc
_initterm
_initterm_e
abort
strcpy_s
__CppXcptFilter
__getmainargs
_msize
?terminate@@YAXXZ
memmove
__C_specific_handler
_CxxThrowException
__CxxFrameHandler3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
GetCommandLineW
CloseHandle
GetLastError
SetLastError
WaitForSingleObject
GetCurrentProcess
GetCurrentProcessId
CreateRemoteThread
GetExitCodeThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
IsWow64Process
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
GetCurrentThreadId
QueryPerformanceCounter
CommandLineToArgvW
NtAllocateVirtualMemory
NtProtectVirtualMemory
NtQueryVirtualMemory
memcpy
LdrProcessRelocationBlock
LdrUnloadDll
LdrGetProcedureAddress
swscanf_s
RtlUnicodeStringToAnsiString
RtlInitUnicodeString
wcscpy_s
NtFreeVirtualMemory
RtlImageNtHeader
LdrLoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadProcessMemory
GetCurrentProcessId
CreateProcessW
GetModuleHandleW
FreeLibrary
CreateFileMappingW
OpenThread
VirtualQueryEx
GetExitCodeProcess
CreateThread
GetVersionExW
Module32NextW
Module32FirstW
CreateToolhelp32Snapshot
GetProcessId
IsWow64Process
CreateRemoteThread
LoadLibraryW
MapViewOfFile
CreateFileW
lstrlenW
VirtualFreeEx
SizeofResource
HeapFree
EnterCriticalSection
lstrcpynW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
GetFileAttributesW
HeapSize
GetExitCodeThread
FormatMessageW
GetFileAttributesExW
Process32NextW
LockResource
Process32FirstW
HeapReAlloc
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
HeapDestroy
DeleteCriticalSection
VerSetConditionMask
GetProcessHeap
VerifyVersionInfoW
lstrcmpiW
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
CloseHandle
OutputDebugStringW
GetLastError
Sleep
MultiByteToWideChar
OpenProcess
UnmapViewOfFile
GetCurrentThreadId
WaitForSingleObject
TerminateProcess
DisableThreadLibraryCalls
GetCurrentProcess
SetLastError
VirtualProtect
WriteProcessMemory
MessageBoxA
GetUserObjectInformationW
GetLastActivePopup
GetProcessWindowStation
GetActiveWindow
GetErrorInfo
SysFreeString
NtResumeProcess
RtlNtStatusToDosError
NtSuspendProcess
PathFindFileNameW
PathIsRelativeW
PathRemoveFileSpecW
__std_terminate
strchr
memcpy
__CxxFrameHandler3
__std_type_info_destroy_list
_CxxThrowException
__std_exception_destroy
__std_exception_copy
_except_handler4_common
memset
memmove
wcsrchr
wcsstr
_seh_filter_dll
_errno
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_invalid_parameter_noinfo
_initterm_e
_initterm
_register_onexit_function
_execute_onexit_table
_crt_atexit
_cexit
__stdio_common_vswprintf
fclose
_wfopen
__stdio_common_vswprintf_s
fread
free
_callnewh
malloc
_recalloc
calloc
wmemcpy_s
strncat
wcsncpy
_wcsnicmp
_wcsicmp
wcsncmp
strncpy
_stricmp
_wgetenv
CheckForEnableAccessibility
IsMatch
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAllocEx
ExitProcess
GetModuleHandleW
FreeLibrary
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
GetVersionExW
LoadLibraryW
DeleteCriticalSection
GetModuleHandleExW
InterlockedFlushSList
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
OutputDebugStringW
GetLastError
Sleep
GetCurrentThreadId
TerminateProcess
VirtualFree
SetLastError
VirtualProtect
VirtualQuery
WriteProcessMemory
GetProcAddress
GetModuleHandleA
GetCurrentProcess
DisableThreadLibraryCalls
GetCurrentProcessId
VirtualAlloc
MessageBoxA
GetUserObjectInformationW
GetWindowThreadProcessId
GetClassNameW
SendMessageW
EnumWindows
GetActiveWindow
GetLastActivePopup
GetProcessWindowStation
memset
_except_handler4_common
_CxxThrowException
_amsg_exit
realloc
_errno
_stricmp
free
wcsncmp
_initterm
_initterm_e
__CppXcptFilter
__getmainargs
_msize
?terminate@@YAXXZ
__CxxFrameHandler3
memcpy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCommandLineW
CloseHandle
GetLastError
SetLastError
WaitForSingleObject
GetCurrentProcess
GetCurrentProcessId
CreateRemoteThread
GetExitCodeThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
IsWow64Process
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentThreadId
IsProcessorFeaturePresent
QueryPerformanceCounter
CommandLineToArgvW
RtlImageNtHeader
LdrProcessRelocationBlock
NtFreeVirtualMemory
NtAllocateVirtualMemory
LdrUnloadDll
NtQueryVirtualMemory
memcpy
LdrGetProcedureAddress
swscanf_s
RtlInitUnicodeString
wcscpy_s
NtProtectVirtualMemory
LdrLoadDll
RtlUnicodeStringToAnsiString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ