GetRichEdClassStringW
OpenWFileStreamWithFlagsW
PszDomFromIndex
Rollback
Static task
static1
Behavioral task
behavioral1
Sample
f67a013feeaad776f88778e93d482e5962dbda97a792a8b43deeff65da8773aa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f67a013feeaad776f88778e93d482e5962dbda97a792a8b43deeff65da8773aa.exe
Resource
win10v2004-20220812-en
Target
f67a013feeaad776f88778e93d482e5962dbda97a792a8b43deeff65da8773aa
Size
169KB
MD5
939af10ce6413d1b5cd1ac64c5b44080
SHA1
8545fa60a40ed660daedc7bc10adb0c5710eb7a8
SHA256
f67a013feeaad776f88778e93d482e5962dbda97a792a8b43deeff65da8773aa
SHA512
e2019874839bde09173f9c6b02cf32b34cc5967cd2d56526f519992389a08f71bf0df9e922b2e724c94a5235d110c4b4f084146715d592c9b6bdffe93a7b5a9b
SSDEEP
3072:1UJIAB2KrzmKLdaF56DNomkocBHYV3CXPmV2+l1tf4eHKn4LJ0k6M9KQZK1wJT9X:6CAZrzdLC2NG5BrXu2C1tfXKn4LJDcEp
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenProcess
Process32First
Process32Next
RemoveDirectoryA
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
Module32First
SetLastError
Sleep
TerminateProcess
UnmapViewOfFile
OpenFile
VirtualFree
WaitForSingleObject
WinExec
MapViewOfFile
LocalAlloc
GetWindowsDirectoryA
GetVersionExA
GetUserDefaultLangID
GetSystemDirectoryA
GetStartupInfoA
GetShortPathNameA
GetProcAddress
GetPrivateProfileStringA
MultiByteToWideChar
VirtualAlloc
MoveFileExA
GetModuleHandleA
GetLastError
GetFullPathNameA
GetFileSize
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCurrentDirectoryA
GetComputerNameA
FreeLibrary
FormatMessageA
FindNextFileA
FindFirstFileA
FindClose
ExitProcess
DeviceIoControl
DeleteFileA
CreateToolhelp32Snapshot
CreateProcessA
CreateFileMappingA
CreateFileA
CreateDirectoryA
CopyFileA
SetFilePointer
CloseHandle
PathIsDirectoryA
CopyRect
GetWindowInfo
GetSystemMetrics
SendMessageA
GetWindowRect
SetWindowPos
SetUserObjectSecurity
SetDlgItemTextA
SetCapture
MessageBoxA
LoadStringA
CreateCursor
IsDlgButtonChecked
DialogBoxParamA
EnableWindow
EndDialog
GetDlgItem
GetParent
ShellExecuteW
SHGetSpecialFolderPathA
CoUninitialize
CoInitialize
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
OpenServiceA
CloseServiceHandle
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAccessAllowedAce
AccessCheck
OpenThreadToken
QueryServiceStatus
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
RevertToSelf
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
DeleteService
SetSecurityDescriptorOwner
FreeSid
GetLengthSid
GetUserNameA
ImpersonateSelf
InitializeAcl
InitializeSecurityDescriptor
IsValidSecurityDescriptor
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
ControlService
dwLBSubclass
WantArrows
Ssync_ANSI_UNICODE_Struct_For_WOW
CommDlgExtendedError
LoadAlterBitmap
FrameRgn
GetPolyFillMode
CM_Is_Dock_Station_Present_Ex
SetupDiBuildDriverInfoList
SetupDiCallClassInstaller
SetupDiClassGuidsFromNameA
SetupDiCreateDeviceInfoA
SetupDiCreateDeviceInfoList
SetupDiDestroyDriverInfoList
SetupDiEnumDriverInfoA
SetupDiGetClassDevsA
SetupDiSetDeviceRegistryPropertyA
GetRichEdClassStringW
OpenWFileStreamWithFlagsW
PszDomFromIndex
Rollback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ