TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
454b43aa28fceaefd7e96f9144df3a8505da643c5879aebf246d761260e74e1f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
454b43aa28fceaefd7e96f9144df3a8505da643c5879aebf246d761260e74e1f.exe
Resource
win10v2004-20240412-en
Target
454b43aa28fceaefd7e96f9144df3a8505da643c5879aebf246d761260e74e1f
Size
9.7MB
MD5
ad198bc338a695a6a2b8980ce051ba4e
SHA1
5105619e1d7cc366d582fedad38695a08bc84876
SHA256
454b43aa28fceaefd7e96f9144df3a8505da643c5879aebf246d761260e74e1f
SHA512
c55284d6bfad8d2ee0ac8de87bd957beff013f37cc89a9aed8f489914ac57c9ae60ea8074f31c7447adcd0ad60c63aa45f5a008a2bb759ec290f88dc0cb30035
SSDEEP
196608:XU96aqO3h7v+exjUDYZIBrisaEosFYUvSyXIlAx8KJipRYOP+CTlK:Xu6aq0qexjUDdBrbyyYO6Ax8KJi3++E
Checks for missing Authenticode signature.
resource |
---|
454b43aa28fceaefd7e96f9144df3a8505da643c5879aebf246d761260e74e1f |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SetFileAttributesW
GetFileType
GetACP
GetExitCodeProcess
CloseHandle
LocalFree
SizeofResource
VirtualProtect
TerminateThread
QueryPerformanceFrequency
IsDebuggerPresent
FlushInstructionCache
VirtualFree
GetFullPathNameW
ExitProcess
HeapAlloc
GetCPInfoExW
RtlUnwind
GetCPInfo
EnumSystemLocalesW
GetStdHandle
GetTimeZoneInformation
DisconnectNamedPipe
GetModuleHandleW
FreeLibrary
TryEnterCriticalSection
SetDllDirectoryW
HeapDestroy
ReadFile
CreateProcessW
GetLastError
GetModuleFileNameW
SetLastError
FindResourceW
CreateThread
CompareStringW
lstrcmpA
LoadLibraryA
ResetEvent
FreeResource
GetVersion
RaiseException
FormatMessageW
SwitchToThread
GetExitCodeThread
GetCurrentThread
LoadLibraryExW
LockResource
GetCurrentThreadId
UnhandledExceptionFilter
VirtualQuery
VirtualQueryEx
Sleep
EnterCriticalSection
SetFilePointer
FlushFileBuffers
LoadResource
SuspendThread
GetTickCount
WaitForMultipleObjects
GetFileSize
GetStartupInfoW
GetFileAttributesW
SetCurrentDirectoryW
InitializeCriticalSection
GetThreadPriority
GetCurrentProcess
SetThreadPriority
VirtualAlloc
GetCommandLineW
GetSystemInfo
LeaveCriticalSection
GetProcAddress
ResumeThread
GetVersionExW
VerifyVersionInfoW
GetModuleHandleA
HeapCreate
GetDiskFreeSpaceW
VerSetConditionMask
FindFirstFileW
GetUserDefaultUILanguage
GetConsoleOutputCP
GetConsoleCP
GetModuleFileNameA
lstrlenW
SetEndOfFile
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
HeapFree
WideCharToMultiByte
FindClose
MultiByteToWideChar
SetEvent
GetLocaleInfoW
CreateFileW
DeleteFileW
IsDBCSLeadByteEx
ConnectNamedPipe
GetLocalTime
WaitForSingleObject
WriteFile
CreateNamedPipeW
ExitThread
DeleteCriticalSection
GetDateFormatW
TlsGetValue
IsValidLocale
TlsSetValue
GetSystemDefaultUILanguage
EnumCalendarInfoW
LocalAlloc
RemoveDirectoryW
SetConsoleCtrlHandler
CreateEventW
SetThreadLocale
GetThreadLocale
InterlockedPopEntrySList
QueryDepthSList
InterlockedFlushSList
InitializeSListHead
InterlockedPushEntrySList
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
UnregisterClassW
CreateWindowExW
GetClassInfoW
WaitForInputIdle
TranslateMessage
CharLowerBuffW
CharUpperW
PeekMessageW
GetSystemMetrics
DefWindowProcW
SetWindowLongW
GetWindowLongW
PostMessageW
MessageBoxW
MessageBoxA
DestroyWindow
CharUpperBuffW
SendMessageTimeoutW
RegisterClassW
CharNextW
MsgWaitForMultipleObjects
LoadStringW
DispatchMessageW
SafeArrayPutElement
VariantInit
VariantClear
SysFreeString
SafeArrayAccessData
SysReAllocStringLen
SafeArrayCreate
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
VariantCopy
VariantChangeType
NetWkstaGetInfo
NetApiBufferFree
RegSetValueExW
RegConnectRegistryW
RegEnumKeyExW
RegLoadKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryInfoKeyW
RegUnLoadKeyW
RegSaveKeyW
RegDeleteValueW
RegReplaceKeyW
RegFlushKey
RegEnumValueW
RegQueryValueExW
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyExW
SetSecurityDescriptorDacl
RegRestoreKeyW
TMethodImplementationIntercept
__dbk_fcall_wrapper
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ