D:\Git-repo\qb10frame_116_release\chrome\out\Release\uninst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
83b187288553b5f9733e93862d8d95f56832a9f983ef8bd913d77a406005bed2.exe
Resource
win7-20240903-en
General
-
Target
83b187288553b5f9733e93862d8d95f56832a9f983ef8bd913d77a406005bed2
-
Size
763KB
-
MD5
4d4d8a786a5bbba329a97062b2a8a834
-
SHA1
c15127ad7088db594c13456f977f13643142a650
-
SHA256
83b187288553b5f9733e93862d8d95f56832a9f983ef8bd913d77a406005bed2
-
SHA512
2794f410af66ee1d1f58dbbd9282b141d6f3f7603f3dc9296be20d7efe0205f6288840b3630ed31ec076c36861e460676372cfaa7bc320181edce27bac2a0473
-
SSDEEP
12288:HvRlqsCUfhD35IxDtv5wvUCwhBASLO98rgsdmD4m0igakvJMxxaNauNSuCjZMr1o:PRlqsCUfh9IxDfvhej8rgs0D4my9vkiw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83b187288553b5f9733e93862d8d95f56832a9f983ef8bd913d77a406005bed2
Files
-
83b187288553b5f9733e93862d8d95f56832a9f983ef8bd913d77a406005bed2.exe windows:6 windows x86 arch:x86
debf3afba64448c8f115b2fc1f06c46f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileAttributesW
TerminateProcess
RemoveDirectoryW
CreateThread
GetWindowsDirectoryW
GetExitCodeProcess
CreateProcessW
FreeLibrary
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetVersionExW
GetCurrentProcess
GetModuleHandleW
ChangeTimerQueueTimer
DeleteTimerQueueTimer
CreateTimerQueueTimer
DeleteTimerQueue
CreateTimerQueue
LocalFree
GetCommandLineW
GetCurrentProcessId
OpenProcess
CopyFileW
GetTickCount
GetTempPathW
MoveFileExW
GetModuleFileNameW
DeleteFileW
WaitForSingleObject
DecodePointer
LeaveCriticalSection
EnterCriticalSection
FindNextFileW
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
lstrlenW
FindFirstFileW
GetFullPathNameW
SetLastError
FindClose
GetProcAddress
LoadLibraryW
Sleep
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
ReadFile
GetFileSize
CreateFileW
CloseHandle
SetThreadContext
GetThreadContext
WriteConsoleW
FlushFileBuffers
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
SetStdHandle
GetCurrentDirectoryW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
SetFilePointerEx
GetStdHandle
ExitProcess
PeekNamedPipe
GetFileType
GetFileInformationByHandle
GetDriveTypeW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindFirstFileExW
RtlUnwind
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
LCMapStringEx
QueryPerformanceCounter
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
IsDebuggerPresent
DeviceIoControl
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VerifyVersionInfoW
VerSetConditionMask
GlobalAlloc
GlobalLock
GlobalUnlock
FreeResource
LoadLibraryExW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryW
SetFilePointer
WriteFile
lstrcmpiW
ExpandEnvironmentStringsW
CreateEventW
GetLocalTime
GetShortPathNameW
GetLogicalDriveStringsW
QueryDosDeviceW
lstrcpyW
lstrcatW
GetSystemDirectoryW
GetCurrentThreadId
CreateMutexW
OpenMutexW
GetSystemDefaultLangID
LocalAlloc
GlobalFree
ResumeThread
WritePrivateProfileStringW
SetEndOfFile
VirtualAlloc
VirtualFree
K32GetMappedFileNameW
OutputDebugStringW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
TerminateThread
GetSystemTimeAsFileTime
SetEvent
WaitForMultipleObjects
user32
UnregisterClassW
PostMessageW
IsWindow
ShowWindow
wsprintfW
DispatchMessageW
TranslateMessage
GetMessageW
DestroyWindow
GetSysColor
InvalidateRect
CopyRect
IsWindowVisible
SendInput
GetForegroundWindow
SetForegroundWindow
EnumWindows
ClientToScreen
SetWindowRgn
UpdateLayeredWindow
IsZoomed
IsIconic
PostThreadMessageW
PeekMessageW
GetDesktopWindow
GetWindowDC
LoadStringW
CharUpperW
GetDlgItem
GetClassInfoExW
RegisterClassExW
RedrawWindow
PostQuitMessage
GetWindow
MonitorFromWindow
GetMonitorInfoW
GetWindowRect
MapWindowPoints
SetWindowPos
MoveWindow
SetWindowTextW
CallWindowProcW
DefWindowProcW
SetWindowLongW
MessageBoxW
GetWindowThreadProcessId
OffsetRect
KillTimer
SetTimer
EqualRect
SendMessageW
SetCapture
ReleaseCapture
UnionRect
PtInRect
CreateWindowExW
GetCursorPos
ScreenToClient
IntersectRect
IsWindowEnabled
IsRectEmpty
BeginPaint
EndPaint
GetClientRect
EnumChildWindows
GetParent
DestroyIcon
SetRectEmpty
LoadImageW
SetCursor
LoadCursorW
GetWindowLongW
UpdateWindow
DrawFocusRect
GetDC
ReleaseDC
DrawTextW
FindWindowW
FindWindowExW
gdi32
GetCurrentObject
MoveToEx
LineTo
ExtTextOutW
SetBkColor
SetBitmapBits
GetBitmapBits
SetDIBColorTable
GetTextExtentExPointW
GetStockObject
TextOutW
GetTextExtentPoint32W
DeleteObject
SetBkMode
SetTextColor
SelectObject
CreateFontW
DeleteDC
CreateDIBSection
SetViewportOrgEx
CreateCompatibleDC
CreateFontIndirectW
GetObjectW
SaveDC
RestoreDC
BitBlt
GetViewportOrgEx
GetClipBox
RectVisible
SelectClipRgn
CreateRectRgnIndirect
CombineRgn
advapi32
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
ConvertSidToStringSidW
GetTokenInformation
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegQueryValueExW
RegSetValueExW
ole32
CoUninitialize
CoTaskMemFree
CreateStreamOnHGlobal
CoInitialize
CoCreateGuid
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
VariantInit
VariantClear
SysFreeString
shlwapi
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
PathCombineW
PathRemoveBackslashW
PathRemoveBlanksW
PathCanonicalizeW
SHGetValueW
PathMatchSpecW
PathFindFileNameW
SHDeleteValueW
SHDeleteKeyW
PathIsDirectoryEmptyW
PathIsDirectoryW
PathIsRootW
comctl32
_TrackMouseEvent
msimg32
AlphaBlend
gdiplus
GdipGetImagePixelFormat
GdiplusStartup
GdipCreatePen1
GdipAlloc
GdipFree
GdipDeleteBrush
GdipDeleteGraphics
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImageHeight
GdipGetImageWidth
GdipCreateLineBrushFromRect
GdipFillRectangle
GdipGetImageGraphicsContext
GdipDrawImageI
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromStream
GdipCloneImage
GdipDrawImageRectRectI
GdipRotateWorldTransform
GdipTranslateWorldTransform
GdipResetWorldTransform
GdipDisposeImage
GdipSetImageAttributesWrapMode
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromHBITMAP
GdipDrawLineI
GdipCreateFromHDC
GdipDeletePen
netapi32
NetApiBufferFree
NetWkstaTransportEnum
Netbios
psapi
GetProcessImageFileNameW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ws2_32
htonl
htons
winhttp
WinHttpSendRequest
WinHttpOpen
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpQueryDataAvailable
WinHttpAddRequestHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpWriteData
WinHttpOpenRequest
WinHttpReadData
Sections
.text Size: 514KB - Virtual size: 514KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 90KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE