__dbk_fcall_wrapper
dbkFCallWrapperAddr
madTraceProcess
Static task
static1
Behavioral task
behavioral1
Sample
ecfb436ec6a8255fd914531ee245f1a07973497ca1e6a657e7455a555b6dee30.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ecfb436ec6a8255fd914531ee245f1a07973497ca1e6a657e7455a555b6dee30.exe
Resource
win10v2004-20240802-en
Target
ecfb436ec6a8255fd914531ee245f1a07973497ca1e6a657e7455a555b6dee30
Size
9.7MB
MD5
1c76e986a3e2d2f8beb41989d7a21f2c
SHA1
9c5adc431184c3894282c123b0f22fb9b245c267
SHA256
ecfb436ec6a8255fd914531ee245f1a07973497ca1e6a657e7455a555b6dee30
SHA512
64f2e19a767b7e34fb251ff81b726bde2f7aca81f6e402d3ac6f8766f179d215cce9aa28eb5fb678f77cbc5306ae08e9430158ba0e35a9cddb52aac52cf25e0d
SSDEEP
196608:6anZBaLHYwvr3T/7EtKQfTGuD/J/BBBsiB8qjupgmt:6aZqYmT0KQqUBl6Quvt
Checks for missing Authenticode signature.
resource |
---|
ecfb436ec6a8255fd914531ee245f1a07973497ca1e6a657e7455a555b6dee30 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
timeGetTime
SHCreateStreamOnFileW
DocumentPropertiesW
ClosePrinter
OpenPrinterW
GetDefaultPrinterW
EnumPrintersW
GetSaveFileNameW
GetSaveFileNameA
PrintDlgW
ImageList_GetImageInfo
FlatSB_SetScrollInfo
InitCommonControls
ImageList_DragMove
ImageList_Destroy
_TrackMouseEvent
ImageList_DragShowNolock
ImageList_Add
FlatSB_SetScrollProp
ImageList_GetDragImage
ImageList_Create
ImageList_EndDrag
ImageList_DrawEx
ImageList_SetImageCount
FlatSB_GetScrollPos
FlatSB_SetScrollPos
InitializeFlatSB
ImageList_Copy
FlatSB_GetScrollInfo
ImageList_Write
ImageList_DrawIndirect
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_BeginDrag
ImageList_GetIcon
ImageList_Replace
ImageList_GetImageCount
ImageList_DragEnter
ImageList_GetIconSize
ImageList_SetIconSize
ImageList_Read
ImageList_DragLeave
ImageList_LoadImageW
ImageList_Draw
ImageList_Remove
ImageList_ReplaceIcon
ImageList_SetOverlayImage
SHBrowseForFolderW
SHGetSpecialFolderLocation
Shell_NotifyIconW
SHGetInstanceExplorer
ShellExecuteExA
SHGetPathFromIDListW
SHGetPathFromIDListA
SHGetFileInfoW
SHGetMalloc
SHGetDesktopFolder
SHAppBarMessage
ShellExecuteA
ShellExecuteW
CopyImage
MoveWindow
SetMenuItemInfoW
GetMenuItemInfoW
DefFrameProcW
DrawTextA
GetDlgCtrlID
FrameRect
RegisterWindowMessageW
GetMenuStringW
FillRect
UnregisterClassA
SendMessageA
EnumWindows
ShowOwnedPopups
GetClassInfoW
GetScrollRange
SetActiveWindow
GetActiveWindow
DrawEdge
GetKeyboardLayoutList
OemToCharBuffA
LoadBitmapW
EnumChildWindows
SendMessageTimeoutA
GetScrollBarInfo
UnhookWindowsHookEx
SetCapture
GetCapture
ShowCaret
CreatePopupMenu
GetMenuItemID
CharLowerBuffW
PostMessageW
SetWindowLongW
IsZoomed
SetParent
DrawMenuBar
GetClientRect
IsChild
LoadImageA
IsIconic
CallNextHookEx
ShowWindow
SetForegroundWindow
GetWindowTextW
PostThreadMessageA
IsDialogMessageW
DestroyWindow
RegisterClassW
EndMenu
CharNextW
GetFocus
GetDC
SetFocus
ReleaseDC
CreateWindowExA
GetClassLongW
GetMessageA
CharToOemBuffA
SetScrollRange
DrawTextW
PeekMessageA
MessageBeep
SetClassLongW
RemovePropW
AttachThreadInput
GetSubMenu
DestroyIcon
IsWindowVisible
PtInRect
DispatchMessageA
UnregisterClassW
GetTopWindow
SendMessageW
GetMessageTime
LoadStringW
CreateMenu
CharLowerW
SetWindowRgn
SetWindowPos
GetMenuItemCount
GetSysColorBrush
GetWindowDC
DrawTextExW
CharLowerBuffA
GetScrollInfo
SetWindowTextW
GetMessageExtraInfo
GetSysColor
EnableScrollBar
TrackPopupMenu
DrawIconEx
GetClassNameW
GetMessagePos
GetIconInfo
SetScrollInfo
GetKeyNameTextW
GetDesktopWindow
SetCursorPos
GetCursorPos
SetMenu
GetMenuState
GetMenu
SetRect
GetKeyState
ValidateRect
GetCursor
GetWindowTextA
KillTimer
WaitMessage
RegisterClassA
TranslateMDISysAccel
GetWindowPlacement
CreateIconIndirect
CreateWindowExW
ChildWindowFromPoint
GetMessageW
GetDCEx
PeekMessageW
MonitorFromWindow
GetUpdateRect
MessageBoxA
SetTimer
WindowFromPoint
BeginPaint
RegisterClipboardFormatW
MapVirtualKeyW
OffsetRect
IsWindowUnicode
CharToOemA
DispatchMessageW
CreateAcceleratorTableW
DefMDIChildProcW
GetSystemMenu
SetScrollPos
GetScrollPos
InflateRect
DrawFocusRect
ReleaseCapture
LoadCursorW
ScrollWindow
GetLastActivePopup
CallWindowProcA
GetSystemMetrics
SetWindowTextA
CharUpperBuffW
GetClassNameA
ClientToScreen
SetClipboardData
GetClipboardData
SetWindowPlacement
GetMonitorInfoW
CheckMenuItem
CharUpperW
DefWindowProcW
GetForegroundWindow
EnableWindow
GetWindowThreadProcessId
RedrawWindow
EndPaint
MsgWaitForMultipleObjectsEx
FindWindowA
LoadKeyboardLayoutW
ActivateKeyboardLayout
GetParent
MonitorFromRect
InsertMenuItemW
GetPropW
MessageBoxW
SetPropW
UpdateWindow
MsgWaitForMultipleObjects
OemToCharA
DestroyMenu
SetWindowsHookExW
EmptyClipboard
GetDlgItem
AdjustWindowRectEx
IsWindow
DrawIcon
EnumThreadWindows
InvalidateRect
GetKeyboardState
ScreenToClient
DrawFrameControl
BringWindowToTop
SetCursor
CreateIcon
RemoveMenu
AppendMenuW
GetKeyboardLayoutNameW
OpenClipboard
TranslateMessage
MapWindowPoints
EnumDisplayMonitors
CallWindowProcW
CloseClipboard
DestroyCursor
PostMessageA
CharUpperBuffA
CopyIcon
PostQuitMessage
ShowScrollBar
LoadImageW
EnableMenuItem
HideCaret
FindWindowExW
MonitorFromPoint
LoadIconW
SystemParametersInfoW
GetWindow
GetWindowLongW
GetWindowRect
DefWindowProcA
InsertMenuW
PostThreadMessageW
IsWindowEnabled
IsDialogMessageA
GetMenuDefaultItem
FindWindowW
GetKeyboardLayout
DeleteMenu
MessageBoxW
CharUpperBuffW
wsprintfW
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
VerQueryValueW
VerQueryValueA
GetFileVersionInfoW
GetFileVersionInfoA
URLDownloadToFileW
SafeArrayPutElement
SetErrorInfo
GetErrorInfo
VariantInit
VariantClear
SysFreeString
SafeArrayAccessData
SysReAllocStringLen
SafeArrayCreate
CreateErrorInfo
SafeArrayGetElement
GetActiveObject
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayPtrOfIndex
VariantCopy
SafeArrayGetUBound
SafeArrayGetLBound
VariantChangeType
Netbios
WTSUnRegisterSessionNotification
WTSRegisterSessionNotification
isupper
isalpha
isalnum
toupper
memchr
memcmp
memcpy
memset
isprint
isspace
iscntrl
isxdigit
ispunct
isgraph
islower
tolower
CloseServiceHandle
RegSetValueExW
RegSetValueExA
ControlService
RegConnectRegistryW
RegEnumKeyA
CreateServiceW
GetUserNameW
GetUserNameA
RegQueryInfoKeyA
RegQueryInfoKeyW
RegUnLoadKeyW
RegSaveKeyW
DeleteService
StartServiceW
RegReplaceKeyW
GetTokenInformation
RegCreateKeyExA
RegCreateKeyExW
SetSecurityDescriptorDacl
OpenServiceW
RegLoadKeyW
RegEnumKeyExW
AdjustTokenPrivileges
RegDeleteKeyW
LookupPrivilegeValueW
OpenSCManagerW
OpenProcessToken
RegOpenKeyExW
RegOpenKeyExA
AllocateAndInitializeSid
FreeSid
RegDeleteValueA
RegDeleteValueW
RegFlushKey
RegQueryValueExA
RegQueryValueExW
RegEnumValueW
InitializeSecurityDescriptor
RegCloseKey
RegRestoreKeyW
SetFileTime
GetFileType
GetFileTime
GetACP
LocalFree
CloseHandle
SizeofResource
GetCurrentProcessId
Beep
TerminateThread
IsDebuggerPresent
GetFullPathNameW
FindNextFileW
GlobalSize
GetCPInfoExW
GetSystemTime
SetUnhandledExceptionFilter
GetTempPathA
EnumSystemLocalesW
GetTimeZoneInformation
FileTimeToLocalFileTime
GetVersionExA
FreeLibrary
HeapDestroy
DosDateTimeToFileTime
GetUserDefaultLCID
GetDiskFreeSpaceA
FindFirstFileA
SetLastError
GetModuleFileNameW
GetLastError
GlobalAlloc
GlobalUnlock
CompareStringW
CreateThread
CreateMutexW
LoadLibraryA
ResetEvent
GetVolumeInformationW
RaiseException
FormatMessageW
GetCurrentThread
GetLogicalDrives
CreateFileMappingA
IsBadReadPtr
ExpandEnvironmentStringsW
GetComputerNameA
LoadLibraryExW
FileTimeToSystemTime
VirtualQuery
GlobalFindAtomW
VirtualQueryEx
Sleep
SetFilePointer
FlushFileBuffers
LoadResource
SuspendThread
GetTickCount
WritePrivateProfileStringW
WaitForMultipleObjects
OpenFileMappingA
FindNextFileA
GetFileSize
GetStartupInfoW
GetFileAttributesW
LocalSize
GetThreadPriority
SetThreadPriority
VirtualAlloc
GetSystemInfo
GetTempPathW
LeaveCriticalSection
GetLogicalDriveStringsW
WinExec
GetModuleHandleA
HeapCreate
VerSetConditionMask
GetDiskFreeSpaceW
GetUserDefaultUILanguage
GetConsoleOutputCP
GetModuleFileNameA
CompareStringA
CopyFileA
HeapFree
WideCharToMultiByte
MultiByteToWideChar
FindClose
LoadLibraryW
SetEvent
GetLocaleInfoW
FormatMessageA
GetLocalTime
WaitForSingleObject
DeleteCriticalSection
SetErrorMode
GetComputerNameW
IsValidLocale
VirtualFreeEx
LoadLibraryExA
LocalAlloc
IsDBCSLeadByte
GetPrivateProfileStringW
WaitForMultipleObjectsEx
SetFileAttributesW
QueryDosDeviceW
VirtualProtect
ReadProcessMemory
OpenFileMappingW
lstrcmpiW
QueryPerformanceFrequency
VirtualFree
GetThreadContext
FlushInstructionCache
GetProcessHeap
HeapAlloc
ExitProcess
GetFileAttributesA
GetCurrentDirectoryA
FindNextChangeNotification
RtlUnwind
GetCPInfo
GetCommandLineA
GetStdHandle
GetModuleHandleW
TryEnterCriticalSection
GetWindowsDirectoryA
ReadFile
FileTimeToDosDateTime
CreateProcessW
FindResourceW
CopyFileW
lstrcmpA
MapViewOfFile
MulDiv
CreateFileA
GetLocaleInfoA
GetVersion
GetDriveTypeW
FreeResource
DeleteFileA
MoveFileW
GlobalAddAtomW
OpenProcess
SwitchToThread
GetExitCodeThread
OutputDebugStringW
LocalFileTimeToFileTime
GetFileAttributesExW
SetNamedPipeHandleState
CreateDirectoryA
TerminateProcess
LockResource
GetPriorityClass
RemoveDirectoryA
GetCurrentThreadId
UnhandledExceptionFilter
CreateEventA
GlobalFree
SetFileAttributesA
SetVolumeLabelW
EnterCriticalSection
ReleaseMutex
GetTempFileNameW
GlobalDeleteAtom
GetCurrentDirectoryW
SetCurrentDirectoryW
InitializeCriticalSection
GlobalLock
GetCurrentProcess
GetCommandLineW
ResumeThread
GetProcAddress
DuplicateHandle
VirtualAllocEx
GetVersionExW
VerifyVersionInfoW
DeviceIoControl
LCMapStringW
FindFirstFileW
CreateProcessA
UnmapViewOfFile
GetConsoleCP
FindResourceA
lstrlenW
SetEndOfFile
QueryPerformanceCounter
lstrcmpW
CreateMutexA
SystemTimeToFileTime
CreateFileW
GetSystemDirectoryW
EnumResourceNamesW
DeleteFileW
IsDBCSLeadByteEx
FindCloseChangeNotification
FindFirstChangeNotificationA
GetEnvironmentVariableW
WriteFile
CreateFileMappingW
ExitThread
CreatePipe
TlsGetValue
GetDateFormatW
ExpandEnvironmentStringsA
TlsSetValue
CreateDirectoryW
GetSystemDefaultUILanguage
EnumCalendarInfoW
RemoveDirectoryW
GlobalMemoryStatus
CreateEventW
SetThreadLocale
GetThreadLocale
InitializeCriticalSection
GetModuleFileNameW
GetModuleHandleW
TerminateProcess
GetCurrentProcess
DeleteCriticalSection
LoadLibraryW
CreateEventW
CompareStringW
SetLastError
GetModuleHandleA
VirtualProtect
GetTickCount
EnterCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
WriteProcessMemory
CreateToolhelp32Snapshot
GetCurrentProcessId
GetCurrentThreadId
Thread32First
OpenThread
Thread32Next
CloseHandle
SuspendThread
ResumeThread
GetSystemInfo
FreeLibrary
LoadResource
MultiByteToWideChar
WideCharToMultiByte
FindResourceExW
FindResourceExA
GetThreadLocale
GetUserDefaultLCID
GetSystemDefaultLCID
EnumResourceNamesA
EnumResourceNamesW
EnumResourceLanguagesA
EnumResourceLanguagesW
EnumResourceTypesA
EnumResourceTypesW
HeapAlloc
HeapFree
HeapDestroy
HeapCreate
GetSystemTime
GetLocalTime
SystemTimeToFileTime
CompareFileTime
GetCommandLineA
GetLastError
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
ExitProcess
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
HeapSize
LoadLibraryA
GetLocaleInfoA
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
VirtualQuery
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
gethostbyaddr
getsockopt
setsockopt
select
WSACleanup
gethostbyname
bind
gethostname
closesocket
WSAGetLastError
connect
getpeername
inet_addr
sendto
WSAAsyncSelect
WSAAsyncGetServByName
WSACancelAsyncRequest
send
accept
ntohs
htons
WSAStartup
getservbyname
getsockname
listen
socket
recv
inet_ntoa
ioctlsocket
recvfrom
WSAAsyncGetHostByName
RevokeDragDrop
OleRegEnumVerbs
IsAccelerator
CoCreateInstance
CoUninitialize
ReleaseStgMedium
RegisterDragDrop
IsEqualGUID
CreateStreamOnHGlobal
OleInitialize
ProgIDFromCLSID
OleUninitialize
CoGetClassObject
CoInitialize
CoTaskMemFree
OleDraw
CoTaskMemAlloc
DoDragDrop
StringFromCLSID
OleSetMenuDescriptor
Pie
TextOutA
SetBkMode
CreateCompatibleBitmap
GetEnhMetaFileHeader
CloseEnhMetaFile
RectVisible
AngleArc
ResizePalette
SetAbortProc
SetTextColor
StretchBlt
CreateFontA
RoundRect
SelectClipRgn
RestoreDC
SetRectRgn
GetTextMetricsW
GetWindowOrgEx
CreatePalette
CreateDCW
PolyBezierTo
CreatePen
CreateICW
GetStockObject
CreateSolidBrush
Polygon
MoveToEx
PlayEnhMetaFile
Ellipse
StartPage
GetBitmapBits
GetTextExtentPoint32A
StartDocW
AbortDoc
GetSystemPaletteEntries
GetEnhMetaFileBits
GetEnhMetaFilePaletteEntries
CreatePenIndirect
SetMapMode
CreateFontIndirectW
PolyBezier
LPtoDP
EndDoc
GetObjectW
GetWinMetaFileBits
SetROP2
GetEnhMetaFileDescriptionW
ArcTo
GetTextFaceA
CreateEnhMetaFileW
Arc
CreateRectRgnIndirect
TextOutW
SelectPalette
ExcludeClipRect
MaskBlt
SetWindowOrgEx
EndPage
DeleteEnhMetaFile
Chord
SetDIBits
SetViewportOrgEx
GetViewportOrgEx
CreateRectRgn
RealizePalette
CreateFontW
SetDIBColorTable
GetDIBColorTable
CreateBrushIndirect
PatBlt
SetEnhMetaFileBits
Rectangle
SaveDC
DeleteDC
BitBlt
FrameRgn
GetDeviceCaps
GetTextExtentPoint32W
GetClipBox
IntersectClipRect
Polyline
StartDocA
CreateBitmap
CombineRgn
SetWinMetaFileBits
CreateDIBitmap
GetStretchBltMode
CreateDIBSection
SetStretchBltMode
GetDIBits
LineTo
GetRgnBox
EnumFontsW
CreateHalftonePalette
SelectObject
DeleteObject
ExtFloodFill
UnrealizeObject
CopyEnhMetaFileW
SetBkColor
CreateCompatibleDC
GetBrushOrgEx
GetCurrentPositionEx
GetNearestPaletteIndex
SetTextAlign
GetTextExtentPointW
ExtTextOutW
SetBrushOrgEx
GetPixel
GdiFlush
SetPixel
EnumFontFamiliesExW
StretchDIBits
GetPaletteEntries
__dbk_fcall_wrapper
dbkFCallWrapperAddr
madTraceProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ