ADeviceInputPCM
FIsSpaceA
OpenTable
OpenWFileStreamW
ProcessBatch2
Static task
static1
Behavioral task
behavioral1
Sample
6656c21f7bf6466ba89ebf9cd84f7a3d182a306e9ba0bf0b244772438fe05f9b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6656c21f7bf6466ba89ebf9cd84f7a3d182a306e9ba0bf0b244772438fe05f9b.exe
Resource
win10v2004-20220812-en
Target
6656c21f7bf6466ba89ebf9cd84f7a3d182a306e9ba0bf0b244772438fe05f9b
Size
180KB
MD5
6f4408ce889acdd6deb2cb539c93dc20
SHA1
80dced48d58c54dcf442e32b3c817b730e698faa
SHA256
6656c21f7bf6466ba89ebf9cd84f7a3d182a306e9ba0bf0b244772438fe05f9b
SHA512
018c3d44e8c8cfd771cf7de2f6ad2c96d18c4f2897395885139566a427039015d1cd98f18f24c40d157435953dd020ba0bedaee30e138bd1d57a83a4adc79a96
SSDEEP
3072:M0prqG98gwmUXfT03awqr55TTUnrn5lfzgBx8AXt398JzSLITTvPSThE+XyVR:M0pvVUw3ir7uj8x8Ad39ZmT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetParent
GetKeyboardState
IsDlgButtonChecked
GetSystemMetrics
EndDialog
EnableWindow
IsWindowUnicode
LoadStringA
FrameRect
GetWindowRect
SetWindowWord
SetDlgItemTextA
GetDlgItem
DialogBoxParamA
GetCurrentThreadId
GetFileSize
GetFullPathNameA
GetLastError
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetCurrentThread
GetSystemDirectoryA
GetUserDefaultLangID
GetVersionExA
GetWindowsDirectoryA
LocalAlloc
MapViewOfFile
MultiByteToWideChar
OpenFile
OpenProcess
Process32First
Process32Next
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SetLastError
GetCurrentProcess
UnmapViewOfFile
VirtualAlloc
VirtualFree
WaitForSingleObject
WinExec
GetCurrentDirectoryA
GetComputerNameA
FreeLibrary
FormatMessageA
FindNextFileA
FindFirstFileA
FindClose
ExitProcess
DeleteFileA
CreateToolhelp32Snapshot
CreateProcessA
CreateFileMappingA
CreateFileA
CreateDirectoryA
CopyFileA
CloseHandle
GetStartupInfoA
TerminateProcess
QueryServiceStatus
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RevertToSelf
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
OpenServiceA
OpenSCManagerA
OpenProcessToken
LookupPrivilegeValueA
IsValidSecurityDescriptor
InitializeSecurityDescriptor
InitializeAcl
GetUserNameA
GetLengthSid
FreeSid
DeleteService
ControlService
CloseServiceHandle
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAccessAllowedAce
RegCloseKey
OpenThreadToken
CommDlgExtendedError
PathIsDirectoryA
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
SysFreeString
VarUI4FromStr
SHGetSpecialFolderLocation
ShellExecuteW
SHGetSpecialFolderPathA
CoUninitialize
CoInitialize
ADeviceInputPCM
FIsSpaceA
OpenTable
OpenWFileStreamW
ProcessBatch2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ