TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
73eed4970223e69d8b4e37bf63510796.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73eed4970223e69d8b4e37bf63510796.exe
Resource
win10v2004-20231215-en
Target
73eed4970223e69d8b4e37bf63510796
Size
2.3MB
MD5
73eed4970223e69d8b4e37bf63510796
SHA1
96e1a1bb8313ce5a7933a2a189a2abcab6d72737
SHA256
42954dc014412c3c461e35a8735cce3e4da61e8c0406783c58291f58e9b87288
SHA512
f1166cb600e82b71f580136ac268ecb217ea775d8fc9f6dbef33bd94f00d57829d733f514ec614ea9a2e86a43137260d8aecb056d463ed13ff2afae6f862aaaa
SSDEEP
24576:ImZBRVCXzdBmHb6Mg+8TgXzFLNNlJ+XIFZq98mDMmOlLaGhcBTYZy7Uhr9Bzm7Ot:16PnTgXjvJKI+emYmGLa5TYZSU9mWv
Checks for missing Authenticode signature.
resource |
---|
73eed4970223e69d8b4e37bf63510796 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
DeleteUrlCacheEntryW
SHGetFolderPathW
ShellExecuteExW
URLDownloadToFileW
MoveWindow
GetMessageW
TranslateMessage
DrawTextExW
CharLowerBuffW
PeekMessageW
GetSystemMetrics
SetWindowLongW
PostMessageW
MessageBoxW
GetSysColor
CharUpperBuffW
FrameRect
MsgWaitForMultipleObjects
SetWindowsHookExW
RegisterWindowMessageW
FillRect
DispatchMessageW
CallNextHookEx
IsWindow
FindWindowExW
ShowWindow
CharUpperW
SystemParametersInfoW
LoadIconW
GetWindowLongW
GetWindowRect
PostThreadMessageW
DrawFocusRect
CharNextW
GetWindowThreadProcessId
GetDC
UnhookWindowsHookEx
LoadStringW
ReleaseDC
MsgWaitForMultipleObjectsEx
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
SysFreeString
VariantClear
VariantInit
GetErrorInfo
SysReAllocStringLen
SafeArrayCreate
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VariantChangeType
RegSetValueExW
RegConnectRegistryW
RegEnumKeyExW
RegLoadKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegUnLoadKeyW
RegSaveKeyW
RegDeleteValueW
RegReplaceKeyW
RegFlushKey
RegQueryValueExW
RegEnumValueW
RegCloseKey
RegCreateKeyExW
RegRestoreKeyW
NetWkstaGetInfo
NetApiBufferFree
memcpy
memset
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSetTimeouts
WinHttpConnect
WinHttpReceiveResponse
WinHttpQueryAuthSchemes
WinHttpGetProxyForUrl
WinHttpReadData
WinHttpCloseHandle
WinHttpQueryHeaders
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpWriteData
WinHttpSetCredentials
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpSendRequest
WinHttpQueryOption
SetFileAttributesW
SetFileTime
QueryDosDeviceW
GetACP
GetExitCodeProcess
LocalFree
CloseHandle
SizeofResource
VirtualProtect
TerminateThread
QueryPerformanceFrequency
IsDebuggerPresent
FindNextFileW
GetFullPathNameW
VirtualFree
ExitProcess
HeapAlloc
GetCPInfoExW
GetLongPathNameW
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
GetTimeZoneInformation
FileTimeToLocalFileTime
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
HeapDestroy
FileTimeToDosDateTime
ReadFile
HeapSize
GetLastError
GetModuleFileNameW
SetLastError
FindResourceW
CreateThread
CompareStringW
MapViewOfFile
LoadLibraryA
ResetEvent
GetVolumeInformationW
MulDiv
FreeResource
GetDriveTypeW
GetVersion
RaiseException
FormatMessageW
OpenProcess
SwitchToThread
GetExitCodeThread
OutputDebugStringW
GetCurrentThread
GetLogicalDrives
LocalFileTimeToFileTime
GetFileAttributesExW
LoadLibraryExW
TerminateProcess
LockResource
FileTimeToSystemTime
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
VirtualQueryEx
GlobalFree
Sleep
EnterCriticalSection
SetFilePointer
LoadResource
SuspendThread
GetTickCount
GetFileSize
GetStartupInfoW
GetFileAttributesW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
VirtualAlloc
GetTempPathW
GetSystemInfo
GetCommandLineW
DuplicateHandle
LeaveCriticalSection
GetProcAddress
ResumeThread
GetLogicalDriveStringsW
GetVersionExW
VerifyVersionInfoW
HeapCreate
LCMapStringW
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
UnmapViewOfFile
lstrlenW
QueryPerformanceCounter
SetEndOfFile
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
LoadLibraryW
SetEvent
CreateFileW
GetLocaleInfoW
SystemTimeToFileTime
DeleteFileW
GetLocalTime
WaitForSingleObject
WriteFile
CreateFileMappingW
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
SetErrorMode
IsValidLocale
TlsSetValue
CreateDirectoryW
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
CreateEventW
WaitForMultipleObjectsEx
SetThreadLocale
GetThreadLocale
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
StringFromCLSID
Arc
Pie
SetBkMode
SelectPalette
CreateCompatibleBitmap
MaskBlt
AngleArc
Chord
SetTextColor
StretchBlt
RealizePalette
SetDIBColorTable
GetDIBColorTable
RoundRect
GetTextMetricsW
GetWindowOrgEx
CreatePalette
CreateBrushIndirect
PatBlt
PolyBezierTo
GetStockObject
Polygon
MoveToEx
Rectangle
DeleteDC
BitBlt
Ellipse
GetDeviceCaps
GetTextExtentPoint32W
GetClipBox
Polyline
GetSystemPaletteEntries
CreateBitmap
CreateDIBitmap
GetStretchBltMode
CreateDIBSection
SetStretchBltMode
GetDIBits
CreatePenIndirect
CreateFontIndirectW
LineTo
PolyBezier
CreateHalftonePalette
SelectObject
DeleteObject
ExtFloodFill
UnrealizeObject
SetBkColor
CreateCompatibleDC
GetObjectW
GetBrushOrgEx
GetCurrentPositionEx
SetROP2
ExtTextOutW
SetBrushOrgEx
GetPixel
ArcTo
GdiFlush
SetPixel
GetPaletteEntries
NtQuerySystemInformation
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ