DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
wbapiex.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
wbapiex.dll
Resource
win10v2004-20231215-en
Target
2987c4baaf4151cc8783a3d1b3a05726
Size
42KB
MD5
2987c4baaf4151cc8783a3d1b3a05726
SHA1
5fe284129273eb75855e76483606357cd963209f
SHA256
c42efedeb596069ab0e9c0e34f6252199f5142f5adeab5aa0859eb50b67cf379
SHA512
09da26d68615be82c431cebb0fc6dbca11a49e92c5fabe4ffca8396a54c56811cc04ea4ff2c249337bc708f78202eb9500e791a4dc3dac685805c03d40d9c510
SSDEEP
768:PaKHIhZsjDLhvP8ylx4qS4K4Dg58REYb/eEhggAfLDdtbMB4LmQoq2K5YX7Je:1MZsjDLhsyP4qSHGREWugAfLZqB4qQo6
Checks for missing Authenticode signature.
resource |
---|
unpack001/wbapiex.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocalTime
lstrcmpA
GetLastError
LockResource
LoadResource
FindResourceA
GetModuleFileNameA
lstrlenA
GetFileSize
CopyFileA
GetTempPathA
InterlockedCompareExchange
GetVersion
RemoveDirectoryA
CreateDirectoryA
DisableThreadLibraryCalls
lstrlenW
WideCharToMultiByte
SizeofResource
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
lstrcpyA
lstrcatA
InterlockedIncrement
InterlockedDecrement
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
GetWindowsDirectoryA
CreateThread
CreateFileA
DeleteFileA
MultiByteToWideChar
CreateProcessA
CloseHandle
SetEvent
LoadLibraryA
GetProcAddress
FreeLibrary
GetSystemDirectoryA
FindFirstFileA
EnterCriticalSection
LeaveCriticalSection
GetShortPathNameA
CreateEventA
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSection
MoveFileExA
CallWindowProcA
CreateWindowExA
DestroyWindow
SetWindowLongA
GetWindowLongA
wsprintfA
MessageBoxA
CharNextA
ReleaseDC
GetDC
DefWindowProcA
RegisterClassExA
LoadCursorA
GetClassInfoExA
IsChild
GetFocus
EndPaint
GetClientRect
BeginPaint
CreateDCA
GetDeviceCaps
LPtoDP
SaveDC
SetMapMode
SetWindowOrgEx
SetViewportOrgEx
DeleteDC
RestoreDC
RegEnumKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
CoTaskMemFree
CoInitialize
CoCreateInstance
CoTaskMemRealloc
CoUninitialize
CoTaskMemAlloc
VariantClear
VarUI4FromStr
SysStringLen
LoadRegTypeLi
SysFreeString
RegisterTypeLi
LoadTypeLi
SysAllocString
SetupIterateCabinetA
strchr
_adjust_fdiv
_initterm
?terminate@@YAXXZ
??1type_info@@UAE@XZ
memcmp
malloc
strncmp
tolower
isalpha
isalnum
isspace
ftell
sprintf
srand
rand
atol
memcpy
fread
fputs
realloc
strrchr
_strdup
free
fgetc
time
fprintf
strcat
atoi
_except_handler3
fopen
fseek
fwrite
fclose
??3@YAXPAX@Z
strcpy
??2@YAPAXI@Z
__CxxFrameHandler
_purecall
_CxxThrowException
strcmp
memset
strlen
strstr
strncat
_snprintf
sscanf
strncpy
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
HttpQueryInfoA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ