?SetDeblockHorizUseDCThr@@YAXH@Z
?SetDeblockVertUseDCThr@@YAXH@Z
?av_postprocess@@YAXQAPAEQAHIIHHPAHHH@Z
?getPPmode@@YAHH@Z
Static task
static1
Behavioral task
behavioral1
Sample
1d4b54b130bd39fd44df48f75515fe9e8d61de394b44e695c30a789d21e6f377.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d4b54b130bd39fd44df48f75515fe9e8d61de394b44e695c30a789d21e6f377.dll
Resource
win10v2004-20240226-en
Target
1d4b54b130bd39fd44df48f75515fe9e8d61de394b44e695c30a789d21e6f377
Size
48KB
MD5
52bcee10fa77fc0f60808182e1517283
SHA1
41a64c7b20dfa5219f8137da80b5f13a523cbc93
SHA256
1d4b54b130bd39fd44df48f75515fe9e8d61de394b44e695c30a789d21e6f377
SHA512
afe82a0a11b68cdfa0281322718e6eda0394ce11bc416decfad4a6ae6c8dba8a78407c7c57cd2d89563fcb24cc7761f8dca5c1b1155938e12f6b1c4404423f91
SSDEEP
768:/ck0EnTmJ46fBFzUfRTrPNYK1L/HxZGlocJI0D/Do:XTg46f0fRTrFYK1LZUZ60bD
Checks for missing Authenticode signature.
resource |
---|
1d4b54b130bd39fd44df48f75515fe9e8d61de394b44e695c30a789d21e6f377 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThreadId
TlsSetValue
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsFree
SetLastError
TlsGetValue
GetLastError
TlsAlloc
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
LoadLibraryA
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
RtlUnwind
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualProtect
GetSystemInfo
VirtualQuery
?SetDeblockHorizUseDCThr@@YAXH@Z
?SetDeblockVertUseDCThr@@YAXH@Z
?av_postprocess@@YAXQAPAEQAHIIHHPAHHH@Z
?getPPmode@@YAHH@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ