FreeGlobalObjects
GetContextSpellingSession
GetNextToken
RunCssWordBreaker
Static task
static1
Behavioral task
behavioral1
Sample
072ab362dc6787ba1a480b1ee0ef975742cdda7fa32e6f52d3f3686113debf01.exe
Resource
win7-20220901-en
Target
072ab362dc6787ba1a480b1ee0ef975742cdda7fa32e6f52d3f3686113debf01
Size
310KB
MD5
a3195b43fa81da4700f165eac4223ade
SHA1
b5f8f93a64b29cefc15b58db057acc708dc8edf2
SHA256
072ab362dc6787ba1a480b1ee0ef975742cdda7fa32e6f52d3f3686113debf01
SHA512
8488500b5011c178c814b52849951d25fa1532df17df11640e83b8631baec63d6accb151cee5e7edc8bdb93cab405742ac1469f9cd46ef905769ff1fbc79d024
SSDEEP
6144:Z8V+10P9qpxP7RyuYCfj1MKAaj2YlBIJd7+E+Yjdwt2SUcIkXYOkVUMbG/Nv4:ublmxPtyuHC7YlGD+E+YjdfSUj5UMb8Q
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHFormatDrive
SHChangeNotify
SHFileOperationA
NdrConformantArrayFree
NdrComplexStructFree
CoTaskMemAlloc
CoTaskMemFree
ImageRvaToSection
FindDebugInfoFile
ImagehlpApiVersion
VerQueryValueW
CloseClipboard
CloseDesktop
CharNextA
CloseWindow
CloseWindowStation
GetDC
GetKeyboardLayout
GetKeyboardLayoutList
GetMenuCheckMarkDimensions
GetMonitorInfoA
GetSysColor
GetSystemMetrics
ReleaseDC
CharPrevA
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetProcessTimes
GetShortPathNameA
GetStringTypeExW
GetSystemDefaultLCID
GetSystemDirectoryW
GetSystemInfo
CreateDirectoryW
GetSystemWindowsDirectoryW
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalMemoryStatus
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
EnterCriticalSection
HeapReAlloc
HeapSize
HeapUnlock
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetFileAttributesW
SetLastError
SetLocalTime
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
CloseHandle
DeleteFileW
DeleteCriticalSection
CreateSemaphoreA
CreateMutexA
HeapLock
CreateFileW
GetSystemTimeAsFileTime
FreeSid
GetLengthSid
CopySid
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
CheckTokenMembership
AllocateAndInitializeSid
AddAccessDeniedAce
UnregisterTraceGuids
TraceEvent
SetSecurityDescriptorDacl
RegisterTraceGuidsA
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyExA
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
OpenThreadToken
InitializeSecurityDescriptor
InitializeAcl
GetTraceLoggerHandle
GetTraceEnableLevel
GetTokenInformation
GetSecurityDescriptorDacl
AddAccessAllowedAce
PathFileExistsA
StrChrA
ChrCmpIA
StrCmpNA
DeleteObject
DeleteDC
CreateSolidBrush
CreateDCA
GetDeviceCaps
ord9
FreeGlobalObjects
GetContextSpellingSession
GetNextToken
RunCssWordBreaker
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ