CreateNotify
GetTableIndexInfo
HrGetStreamSize
QueryMemStatus
Static task
static1
Behavioral task
behavioral1
Sample
29fb63a78089beea44ffcbc531206ea9d4e6c154e5f659e621f304094539b975.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
29fb63a78089beea44ffcbc531206ea9d4e6c154e5f659e621f304094539b975.exe
Resource
win10v2004-20220812-en
Target
29fb63a78089beea44ffcbc531206ea9d4e6c154e5f659e621f304094539b975
Size
171KB
MD5
411dfddbc06d215891a0735972ab8474
SHA1
c5081eebd0bdae7650ee0238baa9fde9e1f9e5fa
SHA256
29fb63a78089beea44ffcbc531206ea9d4e6c154e5f659e621f304094539b975
SHA512
cbc2ca651f6bf4ce444c21a066a482e1ce016fd4b31d5c9d62d160d0a0da2308ea26b9f72af1ef36a780d362ca9969ed3223c0f21d051c420734ca96e5a20070
SSDEEP
3072:JSkaNyscwv1VP2jdfP3YgW0M+W18q3lzudqKd0RKwEECtxh:YkwOVPhwtadqEECtx
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FileTimeToLocalFileTime
FileTimeToSystemTime
FindFirstFileA
FreeLibrary
GetCommModemStatus
GetCommState
GetCommTimeouts
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentVariableA
GetExitCodeProcess
GetFileSizeEx
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOverlappedResult
GetProcAddress
GetProcessTimes
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempFileNameW
GetTempPathA
GetThreadContext
GetThreadPriority
GetThreadSelectorEntry
GetThreadTimes
HeapAlloc
HeapDestroy
HeapFree
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchangeAdd
InterlockedIncrement
IsBadCodePtr
IsBadWritePtr
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalFree
LockResource
FileTimeToDosDateTime
OpenEventW
OpenFileMappingW
OpenProcess
OutputDebugStringA
PeekNamedPipe
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReleaseSemaphore
ResetEvent
RtlUnwind
SetCommMask
SetCommState
SetCommTimeouts
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetFilePointer
SetThreadContext
SetUnhandledExceptionFilter
SizeofResource
SleepEx
SuspendThread
SwitchToFiber
TerminateThread
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualProtect
VirtualProtectEx
VirtualQueryEx
WaitCommEvent
WaitForMultipleObjects
WaitForSingleObjectEx
WaitNamedPipeW
WriteFile
WriteProcessMemory
ExitProcess
EnterCriticalSection
DuplicateHandle
DisableThreadLibraryCalls
DeviceIoControl
DeleteFileA
DeleteFiber
DebugBreak
DebugActiveProcess
CreateThread
CreateSemaphoreA
CreateRemoteThread
CreateNamedPipeW
CreateFileMappingA
CreateFileA
CreateEventA
CreateDirectoryW
ContinueDebugEvent
ConnectNamedPipe
ClearCommError
MapViewOfFile
CancelIo
waveOutGetVolume
waveInOpen
mmsystemGetVersion
midiStreamRestart
midiOutClose
midiInUnprepareHeader
midiInReset
mciFreeCommandResource
joyGetThreshold
aux32Message
mmioWrite
GetFileVersionInfoSizeW
VerQueryValueA
VerFindFileA
GetFileVersionInfoW
RpcIfIdVectorFree
RpcServerInqIf
RpcErrorGetNumberOfRecords
RpcSsDestroyClientContext
RpcSsGetContextBinding
RpcAsyncRegisterInfo
RpcAsyncCancelCall
NdrpReleaseTypeGenCookie
NdrXmitOrRepAsFree
NdrSimpleTypeUnmarshall
NdrSimpleStructUnmarshall
NdrServerCall2
NdrRpcSsEnableAllocate
NdrPointerMarshall
NdrMesSimpleTypeDecode
NdrFullPointerXlatFree
NdrFixedArrayMemorySize
RpcSmDisableAllocate
CStdStubBuffer_Disconnect
CStdStubBuffer_QueryInterface
I_RpcReceive
NdrFixedArrayFree
NdrEncapsulatedUnionBufferSize
NdrConformantVaryingStructMemorySize
_stricmp
_strnicmp
_vsnwprintf
_wcslwr
_wcsnicmp
_wcsupr
_wctime
_wgetenv
_wrename
_write
_wsetlocale
_wstrtime
_wtmpnam
_wtol
atoi
atol
ceil
feof
fgets
fprintf
fseek
ftell
isleadbyte
isprint
isspace
iswalnum
iswalpha
iswdigit
iswprint
iswspace
iswupper
ldexp
malloc
memcpy
memmove
printf
qsort
realloc
sscanf
strchr
strcpy
strcspn
_spawnlp
strncmp
strstr
strtoul
swscanf
towlower
towupper
wcsncmp
wcsncpy
wcsrchr
wctomb
_itow
_ismbcsymbol
_ismbcspace
_isatty
_iob
_initterm
_heapused
_getche
_fileno
_execl
_errno
_atoi64
_amsg_exit
__pioinfo
_spawnl
_snwprintf
_snprintf
_setsystime
__doserrno
__dllonexit
__badioinfo
__CxxFrameHandler
_XcptFilter
_purecall
_popen
_onexit
_memicmp
_lrotl
strncat
_lseeki64
GetMem2
rtcNPer
rtcMIRR
rtcFilter
__vbaVarIdiv
__vbaStrLike
__vbaLateMemStAd
__vbaFreeVarList
__vbaFileSeek
Zombie_Invoke
VBDllCanUnloadNow
PutMem8
RegSetValueExW
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyExW
OpenThreadToken
OpenProcessToken
LsaRetrievePrivateData
InitializeSecurityDescriptor
InitializeAcl
GetUserNameW
GetLengthSid
FreeSid
CryptSetProvParam
CheckTokenMembership
AreAnyAccessesGranted
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAccessDeniedAce
AddAccessAllowedAce
SetSecurityDescriptorDacl
SHGetFolderPathW
DragAcceptFiles
RtlpNtSetValueKey
RtlExtendedMagicDivide
RtlDestroyEnvironment
NtQueryInformationToken
ZwShutdownSystem
GetMessageA
GetMouseMovePointsEx
GetScrollBarInfo
GetScrollInfo
GetScrollRange
GetUserObjectSecurity
IntersectRect
InvertRect
PostQuitMessage
RegisterClassA
SendInput
SetCursor
SetLastErrorEx
SetMessageExtraInfo
AllowSetForegroundWindow
ShowWindow
UpdateWindow
CharNextExA
CreateWindowExA
DdeClientTransaction
DdeFreeDataHandle
DdeImpersonateClient
DdeUnaccessData
DefWindowProcA
DispatchMessageA
EnumClipboardFormats
FlashWindowEx
GetDoubleClickTime
GetInputState
GetKeyState
SetMessageQueue
CreateNotify
GetTableIndexInfo
HrGetStreamSize
QueryMemStatus
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ