Alloc
BrowseForFolderW
GetDatabaseInfo
HriCreatePhonebookEntry
PszAllocA
Rollback
Term2
Static task
static1
Behavioral task
behavioral1
Sample
e698b6cbc3b4c818d23b86937fa61e3ac91cd44ccba7873483852cedbded732a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e698b6cbc3b4c818d23b86937fa61e3ac91cd44ccba7873483852cedbded732a.exe
Resource
win10v2004-20220812-en
Target
e698b6cbc3b4c818d23b86937fa61e3ac91cd44ccba7873483852cedbded732a
Size
164KB
MD5
bd7da8c04404fbd239390576535cbdb0
SHA1
ced2324af05a60c9a3129e3f52323d8c6b435873
SHA256
e698b6cbc3b4c818d23b86937fa61e3ac91cd44ccba7873483852cedbded732a
SHA512
76d60b6301314c6e94bf67f00cfd9215b2668ce91644b8a8604bee30c26cd5f9a5df87073e0a9357ed370f51ac1a20b0691da6a369a0df38d2cf2f14afbf2ccb
SSDEEP
3072:BShnUuEuKzr28QnCg+wmLBeHXzA1atxlQvC6wbJB2s9X7dhU9wkiYOUyvB5gGnJQ:BS9UuEuKzr28QnCHwGBEzA1atxyvqb+i
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenProcess
Process32First
Process32Next
RemoveDirectoryA
SetCurrentDirectoryA
SetEndOfFile
SetEnvironmentVariableA
SetFileAttributesA
Module32First
SetLastError
Sleep
TerminateProcess
UnmapViewOfFile
OpenFile
VirtualFree
WaitForSingleObject
WinExec
MapViewOfFile
LocalAlloc
GetWindowsDirectoryA
GetVersionExA
GetUserDefaultLangID
GetSystemDirectoryA
GetStartupInfoA
GetShortPathNameA
GetProcAddress
GetPrivateProfileStringA
MultiByteToWideChar
VirtualAlloc
MoveFileExA
GetModuleHandleA
GetLastError
GetFullPathNameA
GetFileSize
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCurrentDirectoryA
GetComputerNameA
FreeLibrary
FormatMessageA
FindNextFileA
FindFirstFileA
FindClose
ExitProcess
DeviceIoControl
DeleteFileA
CreateToolhelp32Snapshot
CreateProcessA
CreateFileMappingA
CreateFileA
CreateDirectoryA
CopyFileA
SetFilePointer
CloseHandle
PathIsDirectoryA
CopyRect
GetWindowInfo
GetSystemMetrics
SendMessageA
GetWindowRect
SetWindowPos
SetUserObjectSecurity
SetDlgItemTextA
SetCapture
MessageBoxA
LoadStringA
CreateCursor
IsDlgButtonChecked
DialogBoxParamA
EnableWindow
EndDialog
GetDlgItem
GetParent
ShellExecuteW
SHGetSpecialFolderPathA
CoUninitialize
CoInitialize
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
OpenServiceA
CloseServiceHandle
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAccessAllowedAce
AccessCheck
OpenThreadToken
QueryServiceStatus
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
RevertToSelf
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
DeleteService
SetSecurityDescriptorOwner
FreeSid
GetLengthSid
GetUserNameA
ImpersonateSelf
InitializeAcl
InitializeSecurityDescriptor
IsValidSecurityDescriptor
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
ControlService
dwLBSubclass
WantArrows
Ssync_ANSI_UNICODE_Struct_For_WOW
CommDlgExtendedError
LoadAlterBitmap
FrameRgn
GetPolyFillMode
CM_Is_Dock_Station_Present_Ex
SetupDiBuildDriverInfoList
SetupDiCallClassInstaller
SetupDiClassGuidsFromNameA
SetupDiCreateDeviceInfoA
SetupDiCreateDeviceInfoList
SetupDiDestroyDriverInfoList
SetupDiEnumDriverInfoA
SetupDiGetClassDevsA
SetupDiSetDeviceRegistryPropertyA
Alloc
BrowseForFolderW
GetDatabaseInfo
HriCreatePhonebookEntry
PszAllocA
Rollback
Term2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ