CryptFreeFunc
DupSession
GetColumnInfo
HrCreatePhonebookEntry
SetFontOnRichEd
Static task
static1
Behavioral task
behavioral1
Sample
e73c1edda67e5830fd0c11d5ccec5d913984bfe3fccd9107f6ddd0c08bc0316a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e73c1edda67e5830fd0c11d5ccec5d913984bfe3fccd9107f6ddd0c08bc0316a.exe
Resource
win10v2004-20221111-en
Target
e73c1edda67e5830fd0c11d5ccec5d913984bfe3fccd9107f6ddd0c08bc0316a
Size
173KB
MD5
39e32acfb033297e149a8cd7d04c1793
SHA1
172da625636e1345c12948c8c05b41795b44de2a
SHA256
e73c1edda67e5830fd0c11d5ccec5d913984bfe3fccd9107f6ddd0c08bc0316a
SHA512
232a34f872499f17811ebb498936450005058b78eb5282e7f4ac296d0405b519cffc30d72385bd55acbcf9e4d3a936a5ce99b890235059c95ff37d9e7f7a93d4
SSDEEP
3072:rk6hEVqPzUJ+xdnx2xj8jveq/8vIDc4pLicS70fVoa65p2G/TfmEYCHmFxA4BVs3:aVqb2qnx08rD/4IDc4NZXtoaQp2G/Dm1
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHGetDiskFreeSpaceA
SHGetDesktopFolder
SHCreateDirectoryExW
CommandLineToArgvW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
memset
free
exit
_wcslwr
_wcsdup
_ismbblead
_initterm
_exit
printf
_cexit
_amsg_exit
__setusermatherr
__set_app_type
__p__fmode
__p__commode
__getmainargs
_XcptFilter
wcsstr
wprintf
_controlfp
GetCurrentProcessId
GetCurrentThreadId
GetFullPathNameW
FindFirstFileW
GetCurrentProcess
lstrlenW
VirtualProtect
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
TerminateProcess
Sleep
SetUnhandledExceptionFilter
QueryPerformanceCounter
OutputDebugStringW
InterlockedExchange
InterlockedCompareExchange
GetTickCount
GetSystemTimeAsFileTime
GetStartupInfoA
GetProcAddress
GetModuleHandleA
ExitProcess
FindClose
GetCommandLineW
FindNextFileW
GetLastError
EnumObjects
CreatePalette
MessageBoxW
IsWindow
SendMessageW
CryptFreeFunc
DupSession
GetColumnInfo
HrCreatePhonebookEntry
SetFontOnRichEd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ