AHeartbeat
CryptFreeFunc
DrawPixels
FIsHTMLFile
OpenTempTable2
Static task
static1
Behavioral task
behavioral1
Sample
68f4546e4ecd56714ec2a68114e06faa912e2dfb95b3d53c5205f15d857fe0e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68f4546e4ecd56714ec2a68114e06faa912e2dfb95b3d53c5205f15d857fe0e2.exe
Resource
win10v2004-20220901-en
Target
68f4546e4ecd56714ec2a68114e06faa912e2dfb95b3d53c5205f15d857fe0e2
Size
179KB
MD5
80b62aa50e675e1caee27545639e46a0
SHA1
e1b914fa587fa52f6ea22018ac774fc17268ba8e
SHA256
68f4546e4ecd56714ec2a68114e06faa912e2dfb95b3d53c5205f15d857fe0e2
SHA512
61463361b1136a0796da1fe6f8b0c60ac73f1dd823297e73c20291ced45fa466d19e8db0c15d35e645bf4b813d23a40084c6f6a0668950cdbf672716cf1ccdb5
SSDEEP
3072:xEjf5gbCmAVO/wMS0qUx1OZSN64scRkpdeQrP3dxoZERhkvUWbBu+iGCXQOEOw8E:xETMCmAIn7Lj64scuDbTDoZEDWbw+iDO
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetFolderPathW
DragAcceptFiles
GetUserNameW
SetSecurityDescriptorDacl
RegSetValueExW
AddAccessAllowedAce
AddAccessDeniedAce
AdjustTokenPrivileges
AllocateAndInitializeSid
AreAnyAccessesGranted
CheckTokenMembership
CryptSetProvParam
FreeSid
GetLengthSid
InitializeAcl
InitializeSecurityDescriptor
LsaRetrievePrivateData
OpenProcessToken
OpenThreadToken
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExA
RegQueryValueExA
wctomb
wcsrchr
wcsncpy
wcsncmp
towupper
towlower
swscanf
strtoul
strstr
strncmp
strncat
strcspn
strchr
sscanf
realloc
qsort
printf
memmove
memcpy
malloc
ldexp
iswupper
iswspace
iswprint
iswdigit
iswalpha
iswalnum
isspace
isprint
isleadbyte
ftell
fseek
fprintf
fgets
feof
ceil
atol
atoi
_wtol
_wstrtime
_wsetlocale
_write
_wrename
_wgetenv
_wctime
_wcsupr
_wcsnicmp
_wcslwr
_vsnwprintf
_strnicmp
_stricmp
_spawnlp
_spawnl
_snwprintf
_snprintf
_setsystime
_purecall
_popen
_onexit
_memicmp
_lseeki64
_lrotl
_itow
_ismbcsymbol
_ismbcspace
_isatty
_iob
_initterm
_heapused
_getche
_fileno
_execl
_errno
_atoi64
_amsg_exit
__pioinfo
__doserrno
__dllonexit
__badioinfo
__CxxFrameHandler
_XcptFilter
_wtmpnam
VerFindFileA
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueA
ExitProcess
EnterCriticalSection
WriteProcessMemory
WriteFile
WaitNamedPipeW
WaitForSingleObjectEx
WaitForMultipleObjects
WaitCommEvent
VirtualQueryEx
VirtualProtectEx
VirtualProtect
VirtualFree
VirtualAllocEx
VirtualAlloc
UnmapViewOfFile
UnhandledExceptionFilter
TerminateThread
SwitchToFiber
SuspendThread
SleepEx
SizeofResource
SetUnhandledExceptionFilter
SetThreadContext
SetFilePointer
SetEvent
SetErrorMode
SetEnvironmentVariableA
SetCommTimeouts
SetCommState
SetCommMask
RtlUnwind
ResetEvent
ReleaseSemaphore
ReadFile
RaiseException
QueryPerformanceFrequency
QueryPerformanceCounter
PeekNamedPipe
OutputDebugStringA
OpenProcess
OpenFileMappingW
OpenEventW
MapViewOfFile
LockResource
LocalFree
LoadResource
LoadLibraryA
LeaveCriticalSection
IsBadWritePtr
IsBadCodePtr
InterlockedIncrement
InterlockedExchangeAdd
InterlockedDecrement
InterlockedCompareExchange
HeapFree
HeapDestroy
HeapAlloc
GetThreadTimes
GetThreadSelectorEntry
GetThreadPriority
GetThreadContext
GetTempPathA
GetTempFileNameW
GetTempFileNameA
GetSystemTimeAsFileTime
GetSystemInfo
GetSystemDirectoryA
GetProcessTimes
GetProcAddress
GetOverlappedResult
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetLastError
GetFileSizeEx
GetExitCodeProcess
GetEnvironmentVariableA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCommandLineW
GetCommTimeouts
GetCommState
GetCommModemStatus
FreeLibrary
FindFirstFileA
FileTimeToSystemTime
DuplicateHandle
FileTimeToLocalFileTime
CancelIo
ClearCommError
ConnectNamedPipe
ContinueDebugEvent
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileMappingA
CreateNamedPipeW
CreateRemoteThread
CreateSemaphoreA
CreateThread
DebugActiveProcess
DebugBreak
DeleteFiber
DeleteFileA
DeviceIoControl
DisableThreadLibraryCalls
FileTimeToDosDateTime
AHeartbeat
CryptFreeFunc
DrawPixels
FIsHTMLFile
OpenTempTable2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ