C:\Users\mikael.derain\source\repos\aoe2Patch\bin\Release\dsound.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dedfa388d933a92db73944197f65f70df05646264e01bd7d49637994a3ad506b.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
dedfa388d933a92db73944197f65f70df05646264e01bd7d49637994a3ad506b.dll
Resource
win10v2004-20240508-en
General
-
Target
dedfa388d933a92db73944197f65f70df05646264e01bd7d49637994a3ad506b
-
Size
376KB
-
MD5
ee72b3430d7cc6209d3813c4655f1661
-
SHA1
a309839eb5d296372d3438a9273307a67f62fe09
-
SHA256
dedfa388d933a92db73944197f65f70df05646264e01bd7d49637994a3ad506b
-
SHA512
539d8c8d87f6fd6e2666e3ce4948c3c58287f6285e90b905cd6db356466d850ec535273265486cb2be8ae3d260e62e9bfef7d5d11ce9a050db3fe6e9a1cc4e30
-
SSDEEP
6144:AA0Ph+qqGr0LAN3Mdl4mP6M1IqDjsWck6Ljapnr0LAN3MRZmP6M1IqrgWck6Lja9:AAwh+qqGr0LAN3Mdl4mP6M1IqDjsWckK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dedfa388d933a92db73944197f65f70df05646264e01bd7d49637994a3ad506b
Files
-
dedfa388d933a92db73944197f65f70df05646264e01bd7d49637994a3ad506b.dll windows:5 windows x86 arch:x86
003701b6a876ac7ab2f4e6528a10ef45
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CloseHandle
LoadLibraryA
GetEnvironmentVariableA
CreateToolhelp32Snapshot
Process32First
Process32Next
VirtualProtect
WriteProcessMemory
GetModuleFileNameA
IsBadReadPtr
SetEndOfFile
HeapReAlloc
HeapSize
GetConsoleCP
FlushFileBuffers
GetCurrentProcess
GetProcAddress
FreeLibrary
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
RtlUnwind
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ReadFile
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
WriteConsoleW
ExitProcess
MultiByteToWideChar
WideCharToMultiByte
GetACP
HeapFree
HeapAlloc
GetCurrentDirectoryW
GetFullPathNameW
CompareStringW
LCMapStringW
SetStdHandle
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetStringTypeW
WriteFile
OutputDebugStringW
WaitForSingleObjectEx
CreateThread
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
GetTimeZoneInformation
DecodePointer
user32
GetAsyncKeyState
GetSystemMetrics
MessageBoxA
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
Exports
Exports
DirectSoundCaptureCreate
DirectSoundCaptureCreate8
DirectSoundCaptureEnumerateA
DirectSoundCaptureEnumerateW
DirectSoundCreate
DirectSoundCreate8
DirectSoundEnumerateA
DirectSoundEnumerateW
DirectSoundFullDuplexCreate
DllCanUnloadNow
DllGetClassObject
GetDeviceID
Sections
.text Size: 295KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ