GetTableInfo
HrCopyStreamCB
HrFillRasCombo
HrIsStreamUnicode
OpenTable
PixelMap
ReplaceCharsW
Static task
static1
Behavioral task
behavioral1
Sample
93c8b49b7b1ddeca6887458b245c2aaf2bfd297182a384198dabdba061ff262e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
93c8b49b7b1ddeca6887458b245c2aaf2bfd297182a384198dabdba061ff262e.exe
Resource
win10v2004-20220901-en
Target
93c8b49b7b1ddeca6887458b245c2aaf2bfd297182a384198dabdba061ff262e
Size
163KB
MD5
b073acf22372a2f5cc493ee971a74098
SHA1
6ff458a54abd4e9a041cc9ab49d96e9449fc97fb
SHA256
93c8b49b7b1ddeca6887458b245c2aaf2bfd297182a384198dabdba061ff262e
SHA512
237d2f911040df8d55001d1b569edf4326f3a99091bedea645b14cf69f1b030ab8b9ec97beb9c4b845d18611d9cf63fe68e5320db062c418862f50742382e126
SSDEEP
3072:CdDyCTUzENaRXPtMt1Uce1B/qQlAtnEKyXOIWxVkUYa9RNuOTsybl:lrq4GvUc6yQlnKyXOHwUpDNuUsyb
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetupDiGetDeviceInterfaceDetailA
lstrlenA
lstrcpyA
CreateDirectoryA
VirtualProtect
VirtualFree
VirtualAlloc
SetCurrentDirectoryA
LocalFree
LoadLibraryA
GetVersionExA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
GetFileAttributesA
GetCurrentProcess
GetCurrentDirectoryA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
ShowCursor
SetTimer
SetThreadDesktop
SetKeyboardState
GetWindowPlacement
GetCursorInfo
GetClipboardSequenceNumber
GetAsyncKeyState
EnumThreadWindows
EndPaint
DdeSetUserHandle
ChildWindowFromPointEx
CallNextHookEx
BeginPaint
GetIconInfo
SetStretchBltMode
PlayEnhMetaFile
DeleteObject
GetObjectA
GetFontLanguageInfo
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
CreateDIBitmap
StretchBlt
GetBitmapBits
DeleteDC
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
LsaQuerySecret
RegQueryValueExA
StgCreateDocfileOnILockBytes
SHCreateDirectoryExW
GetTableInfo
HrCopyStreamCB
HrFillRasCombo
HrIsStreamUnicode
OpenTable
PixelMap
ReplaceCharsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ