GetTableInfo
HrCopyStreamCB
HrFillRasCombo
HrIsStreamUnicode
OpenTable
PixelMap
ReplaceCharsW
Static task
static1
Behavioral task
behavioral1
Sample
5087fabff9d30495681df6386e322c0064ddc5d45806f2e8aa769c1e66e7e35c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5087fabff9d30495681df6386e322c0064ddc5d45806f2e8aa769c1e66e7e35c.exe
Resource
win10v2004-20220901-en
Target
5087fabff9d30495681df6386e322c0064ddc5d45806f2e8aa769c1e66e7e35c
Size
164KB
MD5
81267b2ba44d24b75535be5e06feaad0
SHA1
4732cb0e0b857046eef7d63150bb43839f84eefc
SHA256
5087fabff9d30495681df6386e322c0064ddc5d45806f2e8aa769c1e66e7e35c
SHA512
6b926a465eecc1a6e0fa06860e195168ca51cd7f7b526bd2ec3ae1d8e436e2d616773fc30b483dd4eda80548e8eafc8ee99b529efbe77c92b39e50228621f6f9
SSDEEP
3072:Wu5rXJKYAW8/SAsm1OlM/iqVD/JQefKObPxAJEBjnAABP:JFet/S7rlYiQxQ7ObHRnAA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetupDiGetDeviceInterfaceDetailA
lstrlenA
lstrcpyA
CreateDirectoryA
VirtualProtect
VirtualFree
VirtualAlloc
SetCurrentDirectoryA
LocalFree
LoadLibraryA
GetVersionExA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetFileAttributesA
GetCurrentProcess
GetCurrentDirectoryA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
ShowCursor
SetTimer
SetThreadDesktop
SetKeyboardState
GetWindowPlacement
GetCursorInfo
GetClipboardSequenceNumber
GetAsyncKeyState
EnumThreadWindows
EndPaint
DdeSetUserHandle
ChildWindowFromPointEx
CallNextHookEx
BeginPaint
GetIconInfo
SetStretchBltMode
PlayEnhMetaFile
DeleteObject
GetObjectA
GetFontLanguageInfo
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
CreateDIBitmap
StretchBlt
GetBitmapBits
DeleteDC
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
LsaQuerySecret
RegQueryValueExA
StgCreateDocfileOnILockBytes
SHCreateDirectoryExW
GetTableInfo
HrCopyStreamCB
HrFillRasCombo
HrIsStreamUnicode
OpenTable
PixelMap
ReplaceCharsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ