DllCanUnloadNow
DllGetClassObject
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
a18daf3e837754484dda10c9cac48052a45f4a9015b73c9ac70f43e703b6593b.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a18daf3e837754484dda10c9cac48052a45f4a9015b73c9ac70f43e703b6593b.dll
Resource
win10v2004-20240508-en
Target
a18daf3e837754484dda10c9cac48052a45f4a9015b73c9ac70f43e703b6593b
Size
1.1MB
MD5
0b390c0de92cc47ed7af3afbee9aea61
SHA1
daaba7bad20e637ce23136041871f0096ad17c35
SHA256
a18daf3e837754484dda10c9cac48052a45f4a9015b73c9ac70f43e703b6593b
SHA512
1241898cd00cce39e71de4467ad873bb9ca79f35580f1cdf06a236a0e70001ad1e13866a8b95068495a31bf8467c5421dea6b64fe3d235531e7dd0050822117d
SSDEEP
12288:K2c5BvGJxAERTCTM7pP2nh2fU4O/F7cOFY+hE8vS4eIdLm21j+haK8:K55UdkM7punh2fUDF7cOHyIQWSw/
Checks for missing Authenticode signature.
resource |
---|
a18daf3e837754484dda10c9cac48052a45f4a9015b73c9ac70f43e703b6593b |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
EnterCriticalSection
QueryDosDeviceW
SetFilePointer
GetACP
CloseHandle
LocalFree
SuspendThread
VirtualProtect
TlsAlloc
GetTickCount
IsDebuggerPresent
GetFullPathNameW
VirtualFree
HeapAlloc
GetStartupInfoW
ExitProcess
InitializeCriticalSection
GetCPInfoExW
GetThreadPriority
GetCurrentProcess
GlobalLock
SetThreadPriority
VirtualAlloc
RtlUnwind
GetCPInfo
GetCommandLineW
GetSystemInfo
ResumeThread
GetProcAddress
LeaveCriticalSection
EnumSystemLocalesW
GetStdHandle
GetVersionExW
VerifyVersionInfoW
GetModuleHandleW
FreeLibrary
HeapCreate
HeapDestroy
ReadFile
GetDiskFreeSpaceW
VerSetConditionMask
GetUserDefaultUILanguage
FindFirstFileW
TlsFree
HeapSize
SetLastError
GetModuleFileNameW
GetLastError
GlobalUnlock
lstrlenA
lstrlenW
SetEndOfFile
CompareStringW
CreateThread
HeapFree
WideCharToMultiByte
MultiByteToWideChar
FindClose
LoadLibraryW
LoadLibraryA
ResetEvent
SetEvent
CreateFileW
GetLocaleInfoW
GetDriveTypeW
GetVersion
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetLocalTime
WaitForSingleObject
GetCurrentThread
WriteFile
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
IsValidLocale
TlsSetValue
LoadLibraryExW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
CreateEventW
VirtualQueryEx
GetThreadLocale
Sleep
SetThreadLocale
SHGetMalloc
SHGetDesktopFolder
SHGetFolderLocation
ShellExecuteExW
CoTaskMemFree
ReleaseStgMedium
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
SetMenuItemInfoW
GetSysColorBrush
CharLowerBuffW
CharUpperW
PeekMessageW
GetSystemMetrics
MessageBoxW
InsertMenuW
CharUpperBuffW
RegisterClipboardFormatW
CharNextW
DrawIconEx
MsgWaitForMultipleObjects
DestroyIcon
LoadStringW
CreatePopupMenu
FillRect
SysAllocStringLen
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SysFreeString
SysReAllocStringLen
VariantChangeType
SafeArrayCreate
NetWkstaGetInfo
NetApiBufferFree
RegSetValueExW
RegConnectRegistryW
RegEnumKeyExW
RegLoadKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegUnLoadKeyW
RegSaveKeyW
RegDeleteValueW
RegReplaceKeyW
RegFlushKey
RegQueryValueExW
RegEnumValueW
RegCloseKey
RegCreateKeyExW
RegRestoreKeyW
DeleteObject
SelectObject
DeleteDC
CreateDIBSection
CreateCompatibleDC
DllCanUnloadNow
DllGetClassObject
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ