D:\Git-repo\qb10frame_116_release\chrome\src\out\Release_x86\TXBugReport.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
566af5806f74b6031f2aaeab370d536838b0e9369d9df77f903bb2d8bae6357b.exe
Resource
win7-20241010-en
General
-
Target
566af5806f74b6031f2aaeab370d536838b0e9369d9df77f903bb2d8bae6357b
-
Size
848KB
-
MD5
1059c99fb7a0e223b13b9c8250957bca
-
SHA1
5247cddfbfea647592fbabc29923e721e9b91cc5
-
SHA256
566af5806f74b6031f2aaeab370d536838b0e9369d9df77f903bb2d8bae6357b
-
SHA512
4b9de9f731880016907f62376fcaac971984b92339a313a4b0bc3f3b1a47287bd1712b32e44a273bea1f15e286071c63390cd2ee8daea391955ff0d0e95a717d
-
SSDEEP
24576:j37dJeBeU4UFPEP5/FkI7TqThAMceJEPoHfdt:rUFPEP5/FJ6T6MHJ8oHfdt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 566af5806f74b6031f2aaeab370d536838b0e9369d9df77f903bb2d8bae6357b
Files
-
566af5806f74b6031f2aaeab370d536838b0e9369d9df77f903bb2d8bae6357b.exe windows:6 windows x86 arch:x86
597febb47ea17960f5c8bca52c098505
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
dbghelp
SymSetOptions
SymGetModuleInfoW
SymInitialize
SymLoadModule
SymCleanup
wininet
HttpOpenRequestA
InternetReadFile
InternetConnectA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
InternetSetOptionA
InternetCrackUrlA
psapi
GetModuleFileNameExA
GetModuleFileNameExW
comctl32
ImageList_Create
ImageList_ReplaceIcon
InitCommonControlsEx
kernel32
GetLastError
LockResource
HeapReAlloc
CloseHandle
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
Module32FirstW
DecodePointer
HeapDestroy
GetProcAddress
VirtualAllocEx
DeleteCriticalSection
ReadProcessMemory
GetCurrentProcessId
GetProcessHeap
CreateProcessW
GetModuleHandleW
Module32NextW
CreateFileMappingW
MapViewOfFile
GetTickCount
OpenThread
SetUnhandledExceptionFilter
VirtualProtect
InitializeCriticalSectionAndSpinCount
SetCurrentDirectoryW
lstrlenW
GetProcessId
FindClose
WaitForSingleObject
OpenEventW
OpenProcess
MultiByteToWideChar
CreateFileA
SetEvent
lstrcatW
DeleteFileW
LoadLibraryW
CreateThread
GetLocalTime
GetWindowsDirectoryW
VerSetConditionMask
FreeLibrary
CopyFileW
WideCharToMultiByte
VerifyVersionInfoW
IsBadReadPtr
VirtualQueryEx
Sleep
GlobalAlloc
GlobalFree
IsDBCSLeadByte
GlobalLock
lstrcpyW
GlobalUnlock
FindFirstFileW
FindNextFileW
GetTimeZoneInformation
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
ResumeThread
FreeResource
GetFileAttributesW
GetFileSize
Process32NextW
Process32FirstW
UnmapViewOfFile
CreateDirectoryW
ReadFile
WritePrivateProfileStringW
GetSystemDefaultLCID
GetPrivateProfileIntW
SetFilePointer
GetTempPathW
GetPrivateProfileSectionW
GetThreadSelectorEntry
VirtualFree
VirtualAlloc
CreateToolhelp32Snapshot
SetFileAttributesW
GetSystemTimeAsFileTime
QueryPerformanceCounter
MoveFileW
GetProcessTimes
DeviceIoControl
TerminateThread
GetSystemDefaultLangID
SetLastError
GetSystemDirectoryW
GetSystemInfo
LocalFree
OutputDebugStringW
GetFullPathNameW
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
RemoveDirectoryW
MoveFileExW
K32GetMappedFileNameW
LoadLibraryExW
CreateEventW
EncodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
IsDebuggerPresent
RaiseException
UnhandledExceptionFilter
SetEndOfFile
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCommandLineA
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
FindFirstFileExW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
ExitProcess
GetStdHandle
GetVersionExW
GetCurrentThreadId
CreateFileW
InitializeCriticalSectionEx
SetErrorMode
InitializeCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
GetCommandLineW
EnterCriticalSection
HeapFree
WriteProcessMemory
SizeofResource
HeapSize
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
GetFileSizeEx
GetCurrentDirectoryW
SetStdHandle
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlushFileBuffers
WriteConsoleW
WriteFile
user32
KillTimer
GetSysColorBrush
DrawTextW
DialogBoxParamW
InvalidateRect
BeginPaint
EndPaint
EnableWindow
IsWindow
GetWindowThreadProcessId
TrackPopupMenu
CreatePopupMenu
GetClassInfoExW
RegisterClassExW
CreateWindowExW
DestroyWindow
DefWindowProcW
PostThreadMessageW
SetWindowLongW
MapDialogRect
SetClipboardData
SendDlgItemMessageW
MapWindowPoints
SetDlgItemTextW
EmptyClipboard
CloseClipboard
ClientToScreen
SetTimer
OpenClipboard
GetMenuItemCount
GetDC
GetMenuItemID
GetWindowRect
CallWindowProcW
GetKeyState
GetSystemMenu
RegisterClipboardFormatW
GetWindowTextLengthW
ReleaseDC
EnableMenuItem
PostMessageW
IsWindowVisible
EnumChildWindows
GetGuiResources
EnumWindows
GetClassNameW
GetDesktopWindow
GetParent
GetWindowTextW
MessageBoxW
SendMessageW
EndDialog
SetWindowTextW
ShowWindow
LoadIconW
GetClientRect
GetDlgItem
DrawIconEx
LoadImageW
PeekMessageW
DispatchMessageW
GetMessageW
DestroyMenu
GetWindowLongW
SetWindowPos
gdi32
SetTextColor
GetStockObject
CreateFontW
SelectObject
SetBkMode
DeleteObject
advapi32
RegEnumValueW
RegQueryValueExA
RegOpenKeyExA
ConvertSidToStringSidW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
CloseThreadWaitChainSession
GetThreadWaitChain
OpenThreadWaitChainSession
RegQueryValueExW
GetTokenInformation
AdjustTokenPrivileges
RegQueryInfoKeyW
OpenProcessToken
RegisterWaitChainCOMCallback
LookupPrivilegeValueW
shell32
SHGetDesktopFolder
SHBindToParent
ord155
SHGetFileInfoW
ShellExecuteW
SHGetSpecialFolderPathW
ole32
DoDragDrop
CreateStreamOnHGlobal
OleInitialize
CoInitialize
CoCreateGuid
CoUninitialize
OleUninitialize
oleaut32
SysStringLen
SysAllocString
SysFreeString
SysStringByteLen
SysAllocStringByteLen
shlwapi
PathFindExtensionW
PathRemoveExtensionA
PathFindFileNameA
PathFindFileNameW
SHGetValueA
PathAppendW
PathFileExistsW
StrRStrIA
StrTrimA
PathCombineW
PathRemoveFileSpecW
PathIsDirectoryW
PathRemoveExtensionW
SHGetValueW
gdiplus
GdipFree
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipGetImageWidth
GdipDeleteGraphics
GdipImageGetFrameDimensionsCount
GdipGetPropertyItem
GdipLoadImageFromStreamICM
GdipCreateFromHDC
GdipDisposeImage
GdipDrawImageRectI
GdipGetImageHeight
GdipGetPropertyItemSize
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageSelectActiveFrame
GdipCloneImage
ws2_32
htons
htonl
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
dbgeng
DebugCreate
crypt32
CertGetNameStringW
wintrust
WTHelperGetProvCertFromChain
WinVerifyTrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
iphlpapi
GetAdaptersAddresses
GetAdaptersInfo
netapi32
Netbios
NetApiBufferFree
NetWkstaTransportEnum
winhttp
WinHttpOpenRequest
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpWriteData
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpen
WinHttpConnect
WinHttpCloseHandle
Sections
.text Size: 548KB - Virtual size: 547KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 87KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE