| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| Compilation Date | 2026-Mar-11 18:15:57 |
| Detected languages |
English - United States
|
| TLS Callbacks | 1 callback(s) detected. |
| Debug artifacts |
D:\Jenkins\workspace\N_CLSEngine-vs2022\bin\x64\Release\MBAMCore.pdb
|
| CompanyName | Malwarebytes |
| FileDescription | Classification Engine Implementation |
| FileVersion | 3.1.0.214 |
| InternalName | MBAMCore.dll |
| LegalCopyright | (C) Malwarebytes. All rights reserved. |
| OriginalFilename | MBAMCore.dll |
| ProductName | Malwarebytes |
| ProductVersion | 3.1.0.214 |
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
Contains references to system / monitoring tools:
|
| Info | Cryptographic algorithms detected in the binary: |
Uses constants related to CRC32
Uses constants related to MD5 Uses constants related to SHA1 Uses constants related to SHA256 Uses constants related to SHA512 Uses constants related to AES Uses constants related to Blowfish Uses known Mersenne Twister constants Microsoft's Cryptography API |
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Info | The PE is digitally signed. |
Signer: Malwarebytes Inc
Issuer: DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 |
| Safe | VirusTotal score: 0/71 (Scanned on 2026-03-19 13:17:22) | All the AVs think this file is safe. |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x138 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 7 |
| TimeDateStamp | 2026-Mar-11 18:15:57 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x4a6200 |
| SizeOfInitializedData | 0x3cb200 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x00000000003DE2F8 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x180000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x876000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x888df2 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| sfc.dll |
SfcIsFileProtected
|
|---|---|
| CRYPT32.dll |
CertFreeCertificateChain
CertGetCertificateChain CertDuplicateCertificateContext CryptMsgClose CryptQueryObject CryptMsgGetParam CertOpenSystemStoreW CertEnumCertificatesInStore CertGetCertificateContextProperty CertCloseStore CertOpenStore CertFreeCertificateContext CertFindCertificateInStore CryptDecodeObjectEx CryptDecodeObject CertGetNameStringW |
| IPHLPAPI.DLL |
GetAdaptersInfo
|
| WS2_32.dll |
getservbyport
sendto inet_ntoa inet_addr htons WSAGetLastError gethostbyname select ntohs recvfrom getsockopt getsockname ioctlsocket WSACleanup htonl getpeername shutdown socket setsockopt connect closesocket WSAStartup send recv WSASetLastError gethostbyaddr getservbyname |
| MPR.dll |
WNetGetConnectionW
|
| KERNEL32.dll |
GetConsoleScreenBufferInfo
SetConsoleTextAttribute GetStdHandle IsDebuggerPresent SetUnhandledExceptionFilter GetConsoleMode GetTempPathW GetModuleHandleA OpenThread GetSystemDirectoryW GetWindowsDirectoryW GetLongPathNameW GetSystemFirmwareTable IsWow64Process GetNativeSystemInfo GetSystemInfo HeapFree CreateToolhelp32Snapshot Module32FirstW GetLogicalDriveStringsW QueryDosDeviceW CreateProcessW LoadLibraryW GetProcessHeap HeapAlloc GetTickCount GetSystemTime FileTimeToSystemTime GetTimeZoneInformation FlushFileBuffers SetFileAttributesW SetEndOfFile DeleteFileW GlobalAlloc GlobalFree VirtualQueryEx GetVersionExW InitializeCriticalSectionEx DecodePointer LocalAlloc RemoveDirectoryW GetDriveTypeW GetLogicalDrives GetSystemWindowsDirectoryW lstrcmpA GetCurrentDirectoryW InitializeCriticalSectionAndSpinCount GetExitCodeThread CreateMutexW WaitForMultipleObjects GetStartupInfoW TlsAlloc TlsGetValue TlsSetValue TlsFree GetEnvironmentVariableW SetEnvironmentVariableW CreateFileMappingW InitializeSRWLock ReleaseSRWLockExclusive ReleaseSRWLockShared AcquireSRWLockExclusive AcquireSRWLockShared VerSetConditionMask GetFileType GetSystemDirectoryA FormatMessageA GetACP ReleaseSemaphore CreateSemaphoreA SetConsoleMode ReadConsoleA ReadConsoleW GetEnvironmentStringsW GetCommandLineW GetCommandLineA GetOEMCP IsValidCodePage HeapSize HeapReAlloc CreateThread WideCharToMultiByte MultiByteToWideChar CopyFileW LoadLibraryA GetProcAddress GetModuleHandleW GetModuleFileNameW FreeLibrary SetLastError GetFileSizeEx GetFileAttributesW CreateDirectoryW CreateHardLinkW MoveFileExW VirtualFree VirtualAlloc GetThreadId ResumeThread GetExitCodeProcess CreateEventW WaitForSingleObject DeleteCriticalSection InitializeCriticalSection WriteFile SetFilePointerEx SetFilePointer ReadFile GetFileSize FindNextFileW FindFirstFileW FindClose GetFinalPathNameByHandleW OpenFileById DeviceIoControl GetFileAttributesExW GetFileInformationByHandle GetCurrentProcess TerminateProcess RaiseException GetLastError GetCurrentThread SetThreadPriority ResetEvent SetEvent CompareFileTime CloseHandle GetFileTime CreateFileW GetSystemTimeAsFileTime LockResource SizeofResource LoadResource FindResourceW Sleep SwitchToThread LeaveCriticalSection EnterCriticalSection FindFirstFileExW FreeEnvironmentStringsW GetBinaryTypeW QueryPerformanceFrequency QueryPerformanceCounter SystemTimeToFileTime WriteConsoleW GetLocalTime GetCurrentThreadId GetCurrentProcessId GetFullPathNameW FormatMessageW LocalFree VerifyVersionInfoW OutputDebugStringW ExpandEnvironmentStringsW VirtualQuery EnumSystemLocalesW GetUserDefaultLCID IsValidLocale GetLocaleInfoW LCMapStringW CompareStringW GetTimeFormatW GetDateFormatW FlsFree FlsSetValue FlsGetValue EncodePointer LCMapStringEx CompareStringEx GetCPInfo SetFileInformationByHandle WTSGetActiveConsoleSessionId OpenProcess FlsAlloc GetConsoleOutputCP FreeLibraryAndExitThread ExitThread SetStdHandle SetConsoleCtrlHandler GetModuleHandleExW ExitProcess SystemTimeToTzSpecificLocalTime PeekNamedPipe LoadLibraryExW InterlockedFlushSList InterlockedPushEntrySList RtlPcToFileHeader RtlUnwind RtlUnwindEx InitializeSListHead IsProcessorFeaturePresent UnhandledExceptionFilter RtlVirtualUnwind RtlLookupFunctionEntry ReadProcessMemory RtlCaptureContext SleepConditionVariableSRW WakeAllConditionVariable TryAcquireSRWLockExclusive ReleaseMutex GetStringTypeW |
| USER32.dll |
GetUserObjectInformationW
MessageBoxW LoadStringW GetProcessWindowStation CharUpperW |
| ADVAPI32.dll |
GetTokenInformation
AdjustTokenPrivileges LookupPrivilegeValueW CryptAcquireContextW CryptReleaseContext CryptGetHashParam ReportEventW RegisterEventSourceW DeregisterEventSource CryptEnumProvidersW CryptSignHashW CryptDecrypt CryptExportKey CryptGetUserKey CryptGetProvParam CryptSetHashParam CryptDestroyKey CryptAcquireContextA CreateWellKnownSid GetSidSubAuthority GetSidSubAuthorityCount AreAllAccessesGranted MapGenericMask ConvertStringSidToSidW ConvertSidToStringSidW RegUnLoadKeyW RegSetValueExW RegSaveKeyW RegRestoreKeyW RegLoadAppKeyW RegLoadKeyW RegEnumValueW RegEnumKeyW RegDeleteValueW RegDeleteKeyW RegCreateKeyExW TreeSetNamedSecurityInfoW SetSecurityInfo GetSecurityInfo SetNamedSecurityInfoW GetNamedSecurityInfoW SetEntriesInAclW DeleteAce GetExplicitEntriesFromAclW LsaNtStatusToWinError IsTextUnicode OpenThreadToken CryptGenRandom RegQueryValueExA RegOpenKeyExA RegQueryValueExW RegQueryInfoKeyW RegOpenKeyExW RegEnumKeyExW RegCloseKey SaferComputeTokenFromLevel SaferCloseLevel SaferCreateLevel SetTokenInformation GetLengthSid FreeSid EqualSid CreateRestrictedToken AllocateAndInitializeSid CreateProcessAsUserW CryptDestroyHash CryptHashData CryptCreateHash OpenProcessToken |
| SHELL32.dll |
SHGetFolderPathW
SHGetKnownFolderPath |
| ole32.dll |
CoSetProxyBlanket
CoInitializeEx CoUninitialize CoCreateInstance CoInitializeSecurity CoTaskMemFree |
| OLEAUT32.dll |
VariantInit
SysFreeString SysAllocString VariantClear SysStringLen |
| WINTRUST.dll |
WTHelperGetProvSignerFromChain
CryptCATCatalogInfoFromContext CryptCATAdminReleaseContext CryptCATAdminEnumCatalogFromHash WinVerifyTrust CryptCATAdminCalcHashFromFileHandle CryptCATAdminReleaseCatalogContext WTHelperProvDataFromStateData WTHelperGetProvCertFromChain CryptCATAdminAcquireContext |
| VERSION.dll |
VerQueryValueW
GetFileVersionInfoW GetFileVersionInfoSizeW |
| WTSAPI32.dll |
WTSQueryUserToken
WTSEnumerateSessionsW WTSFreeMemory WTSQuerySessionInformationW |
| imagehlp.dll |
UnDecorateSymbolName
|
| RPCRT4.dll |
RpcStringFreeW
UuidToStringW |
| PSAPI.DLL |
GetProcessImageFileNameW
|
| NETAPI32.dll |
NetApiBufferFree
NetWkstaGetInfo |
| AUTHZ.dll |
AuthzAccessCheck
AuthzInitializeContextFromSid AuthzFreeContext AuthzFreeResourceManager AuthzInitializeResourceManager |
| bcrypt.dll |
BCryptDestroyKey
BCryptCreateHash BCryptVerifySignature BCryptOpenAlgorithmProvider BCryptFinishHash BCryptCloseAlgorithmProvider BCryptDestroyHash BCryptImportKeyPair BCryptHashData BCryptGetProperty |
| Ordinal | 1 |
|---|---|
| Address | 0x435990 |
| Ordinal | 2 |
|---|---|
| Address | 0x436b90 |
| Ordinal | 3 |
|---|---|
| Address | 0x436e00 |
| Ordinal | 4 |
|---|---|
| Address | 0x438be0 |
| Ordinal | 5 |
|---|---|
| Address | 0x438bb0 |
| Ordinal | 6 |
|---|---|
| Address | 0x436d80 |
| Ordinal | 7 |
|---|---|
| Address | 0x435ca0 |
| Ordinal | 8 |
|---|---|
| Address | 0x436660 |
| Ordinal | 9 |
|---|---|
| Address | 0x4369c0 |
| Ordinal | 10 |
|---|---|
| Address | 0x436850 |
| Ordinal | 11 |
|---|---|
| Address | 0x435d80 |
| Ordinal | 12 |
|---|---|
| Address | 0x4359f0 |
| Ordinal | 13 |
|---|---|
| Address | 0x435b30 |
| Ordinal | 14 |
|---|---|
| Address | 0x435880 |
| Ordinal | 15 |
|---|---|
| Address | 0x436270 |
| Ordinal | 16 |
|---|---|
| Address | 0x4361e0 |
| Ordinal | 17 |
|---|---|
| Address | 0x435710 |
| Ordinal | 18 |
|---|---|
| Address | 0x4355c0 |
| Ordinal | 19 |
|---|---|
| Address | 0x435620 |
| Ordinal | 20 |
|---|---|
| Address | 0x436360 |
| Ordinal | 21 |
|---|---|
| Address | 0x435ad0 |
| Ordinal | 22 |
|---|---|
| Address | 0x435920 |
| Ordinal | 23 |
|---|---|
| Address | 0x435d10 |
| Ordinal | 24 |
|---|---|
| Address | 0x436310 |
| Ordinal | 25 |
|---|---|
| Address | 0x435800 |
| Ordinal | 26 |
|---|---|
| Address | 0x436060 |
| Ordinal | 27 |
|---|---|
| Address | 0x436140 |
| Ordinal | 28 |
|---|---|
| Address | 0x436670 |
| Ordinal | 29 |
|---|---|
| Address | 0x4363c0 |
| Ordinal | 30 |
|---|---|
| Address | 0x436410 |
| Ordinal | 31 |
|---|---|
| Address | 0x436b30 |
| Ordinal | 32 |
|---|---|
| Address | 0x4360b0 |
| 1 |
| 1 |
| 0 |
| 1 |
| 0 |
| 0 |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 3.1.0.214 |
| ProductVersion | 3.1.0.214 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
| FileType |
VFT_DLL
|
| Language | English - United States |
| CompanyName | Malwarebytes |
| FileDescription | Classification Engine Implementation |
| FileVersion (#2) | 3.1.0.214 |
| InternalName | MBAMCore.dll |
| LegalCopyright | (C) Malwarebytes. All rights reserved. |
| OriginalFilename | MBAMCore.dll |
| ProductName | Malwarebytes |
| ProductVersion (#2) | 3.1.0.214 |
| Resource LangID | English - United States |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Mar-11 18:15:57 |
| Version | 0.0 |
| SizeofData | 93 |
| AddressOfRawData | 0x6479ac |
| PointerToRawData | 0x645fac |
| Referenced File | D:\Jenkins\workspace\N_CLSEngine-vs2022\bin\x64\Release\MBAMCore.pdb |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Mar-11 18:15:57 |
| Version | 0.0 |
| SizeofData | 20 |
| AddressOfRawData | 0x647a0c |
| PointerToRawData | 0x64600c |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Mar-11 18:15:57 |
| Version | 0.0 |
| SizeofData | 1064 |
| AddressOfRawData | 0x647a20 |
| PointerToRawData | 0x646020 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Mar-11 18:15:57 |
| Version | 0.0 |
| SizeofData | 0 |
| AddressOfRawData | 0 |
| PointerToRawData | 0 |
| StartAddressOfRawData | 0x180647e90 |
|---|---|
| EndAddressOfRawData | 0x180648a10 |
| AddressOfIndex | 0x1806dd430 |
| AddressOfCallbacks | 0x1804a9b80 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_ALIGN_16BYTES
|
| Callbacks |
0x00000001803DE7C0
|
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x18069bc80 |
| XOR Key | 0x5e453e63 |
|---|---|
| Unmarked objects | 0 |
| C++ objects (30795) | 212 |
| Unmarked objects (#2) | 1 |
| 253 (VS 2015-2022 runtime 33030) | 10 |
| C objects (VS 2015-2022 runtime 33030) | 16 |
| ASM objects (VS 2015-2022 runtime 33030) | 16 |
| C++ objects (VS 2015-2022 runtime 33030) | 104 |
| ASM objects (30795) | 13 |
| C objects (30795) | 38 |
| C objects (33134) | 848 |
| C++ objects (33134) | 86 |
| ASM objects (VS2022 Update 8 (17.8.3) compiler 33133) | 1 |
| Total imports | 483 |
| Imports (30795) | 43 |
| C++ objects (VS2022 Update 8 (17.8.3) compiler 33133) | 16 |
| C++ objects (LTCG) (33134) | 301 |
| Exports (33134) | 1 |
| Resource objects (33134) | 1 |
| 151 | 1 |
| Linker (33134) | 1 |
No comments yet.