@__lockDebuggerData$qv
@__unlockDebuggerData$qv
MainWndProc
_GUID_NULL
__DebuggerHookData
__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
3721bc224253b6bae0331d79499e0645033fb26bc0f94d2f194e01095c68155d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3721bc224253b6bae0331d79499e0645033fb26bc0f94d2f194e01095c68155d.exe
Resource
win10v2004-20220812-en
Target
3721bc224253b6bae0331d79499e0645033fb26bc0f94d2f194e01095c68155d
Size
249KB
MD5
93a9dab5ced80693d7bc628aea9fcc9a
SHA1
fedc5f361d45998fc45275b24520bf67662acb55
SHA256
3721bc224253b6bae0331d79499e0645033fb26bc0f94d2f194e01095c68155d
SHA512
688500a997ec425029ef6a74f4d6776f7c0132c526730b74656fbdab85f11bbbce22bf448c6e10aedbc3cc23c3b19fe51aacb2002bef9a64e4b51ef5f7915ad4
SSDEEP
6144:bWBa7FiPln8JoeIyC+WmzGAXMBNfxLLSrA2g:bCaWlxeIf+WmzBmHWg
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
WaitForSingleObject
VirtualFree
lstrcmpiA
WriteFile
Sleep
SetHandleCount
CreateFileA
lstrcpyA
lstrcatA
WritePrivateProfileStringA
GetProcAddress
UnhandledExceptionFilter
CloseHandle
CopyFileA
GetModuleHandleA
GetSystemDirectoryA
GetLogicalDrives
GetCurrentProcess
RaiseException
InitializeCriticalSection
GetVersion
ExitProcess
DeleteFileA
GetStartupInfoA
CreateProcessA
VirtualAlloc
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
CreateDirectoryA
SetFileAttributesA
GetPrivateProfileStringA
SetCurrentDirectoryA
GetModuleFileNameA
GetEnvironmentStrings
RtlUnwind
GetCurrentDirectoryA
GlobalMemoryStatus
MultiByteToWideChar
GetCommandLineA
GetWindowsDirectoryA
ExpandEnvironmentStringsA
LeaveCriticalSection
GetVersionExA
EnterCriticalSection
GetCurrentThreadId
GetStdHandle
SetConsoleCtrlHandler
GetShortPathNameA
RemoveDirectoryA
SetFilePointer
RegEnumKeyA
InitializeSecurityDescriptor
RegCreateKeyA
SetSecurityDescriptorDacl
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
RegQueryInfoKeyA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegEnumValueA
SelectObject
GetObjectA
DeleteDC
CreateCompatibleDC
BitBlt
UpdateWindow
TranslateMessage
SetDlgItemTextA
PostQuitMessage
PostMessageA
MessageBoxA
LoadImageA
GetMessageA
GetDlgItemTextA
EnumThreadWindows
EndPaint
EnableWindow
DestroyWindow
DdeUninitialize
DdeInitializeA
DdeGetLastError
DdeFreeStringHandle
DdeFreeDataHandle
DispatchMessageA
DdeDisconnect
DdeCreateStringHandleA
DdeCreateDataHandle
GetDlgItem
DdeConnect
DdeClientTransaction
CreateDialogParamA
BeginPaint
ShowWindow
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetPathFromIDList
SHGetMalloc
SHChangeNotify
SHBrowseForFolder
IsLicActivated
DisplayLicActivationDlg
CoUninitialize
CoInitialize
CoCreateInstance
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
MainWndProc
_GUID_NULL
__DebuggerHookData
__GetExceptDLLinfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE