CreateTexture
HrIndexOfWeek
IsHttpUrlA
Restore
Static task
static1
Behavioral task
behavioral1
Sample
f9f91186cad3053e7fdb2cb41ceba0a0bb24dfaced3c0a5e83331c971e9a5c2b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9f91186cad3053e7fdb2cb41ceba0a0bb24dfaced3c0a5e83331c971e9a5c2b.exe
Resource
win10v2004-20221111-en
Target
f9f91186cad3053e7fdb2cb41ceba0a0bb24dfaced3c0a5e83331c971e9a5c2b
Size
157KB
MD5
4919365ee10d6b1629e8f6d7343f8c3e
SHA1
573428dea02bf3947e46a1c02e34d2d0b7d51ca3
SHA256
f9f91186cad3053e7fdb2cb41ceba0a0bb24dfaced3c0a5e83331c971e9a5c2b
SHA512
ecc453c089bfaed84e6af6cd866addfc046c3a8cf448fb007d9c9576600b8fc7e6fc0a951541edcedfb57a7426707446f7d727b145cb1de5c39955ab5df30408
SSDEEP
3072:0IYKZryUy2VTuiT7YOsi3ciF/dHM4MOgB7LVpfvVjKHqNOcvHUqPJ/SrVwMqot8Z:1g6TfT7cij05B7LVpvttNOFqPpqVenR
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
VerFindFileA
GetFileVersionInfoSizeW
SHGetFolderPathW
DragAcceptFiles
GetStdHandle
GetThreadLocale
GetTickCount
GetVersion
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryExA
GetStartupInfoA
LocalFree
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
RtlUnwind
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcpynA
lstrlenA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetCurrentThreadId
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitThread
ExitProcess
EnterCriticalSection
DeleteCriticalSection
CreateThread
LocalAlloc
RegCreateKeyExW
SystemFunction014
SetSecurityDescriptorDacl
SetSecurityDescriptorControl
RegSetValueExW
RegQueryValueExA
OpenProcessToken
LsaSetQuotasForAccount
LsaGetSystemAccessAccount
InitializeSecurityDescriptor
GetUserNameW
GetLengthSid
FreeSid
CryptSetProvParam
CryptImportKey
CheckTokenMembership
AreAnyAccessesGranted
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAccessAllowedAce
OpenThreadToken
NdrPointerMarshall
RpcSsGetContextBinding
RpcSsDestroyClientContext
RpcSmDisableAllocate
RpcServerInqIf
RpcIfIdVectorFree
RpcAsyncRegisterInfo
CStdStubBuffer_Disconnect
CStdStubBuffer_QueryInterface
NdrEncapsulatedUnionBufferSize
NdrFixedArrayFree
NdrFixedArrayMemorySize
NdrFullPointerXlatFree
NdrMesSimpleTypeDecode
NdrRpcSsEnableAllocate
NdrServerCall2
NdrSimpleStructUnmarshall
NdrSimpleTypeUnmarshall
NdrXmitOrRepAsFree
NdrpReleaseTypeGenCookie
RpcAsyncCancelCall
waveOutGetVolume
waveInOpen
mmsystemGetVersion
mmioWrite
midiStreamRestart
midiOutClose
midiInReset
joyGetThreshold
aux32Message
IntersectRect
IsWindowUnicode
DispatchMessageA
KillTimer
WaitForInputIdle
UpdateWindow
UnpackDDElParam
ToUnicode
ShowWindow
SetTimer
SetClipboardViewer
RegisterClassA
PtInRect
BringWindowToTop
CloseClipboard
CreateIconFromResourceEx
CreateMenu
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
GetWindowPlacement
EnableScrollBar
GetComboBoxInfo
GetDC
GetDlgItem
GetListBoxInfo
GetMessageA
GetNextDlgTabItem
GetPriorityClipboardFormat
GetShellWindow
PostQuitMessage
_XcptFilter
__CxxFrameHandler
__badioinfo
__dllonexit
__doserrno
__pioinfo
_amsg_exit
_atoi64
_errno
_execl
_fileno
_getche
_heapused
_initterm
_iob
_isatty
_ismbcspace
_ismbcsymbol
_itow
_lrotl
_lseeki64
_memicmp
_onexit
_popen
_purecall
_setsystime
_snprintf
_snwprintf
_spawnl
_spawnlp
_stricmp
_strnicmp
_vsnwprintf
_wcslwr
_wcsnicmp
_wcsupr
_wctime
_wgetenv
_wrename
_write
_wsetlocale
_wstrtime
_wtmpnam
_wtol
atoi
atol
ceil
feof
fgets
fprintf
fseek
ftell
isleadbyte
isprint
isspace
iswalnum
iswalpha
iswdigit
iswprint
iswspace
iswupper
ldexp
malloc
memcpy
memmove
printf
qsort
realloc
sscanf
strchr
strcpy
strcspn
strncat
strncmp
strstr
strtoul
swscanf
towlower
towupper
wcsncmp
wcsncpy
wcsrchr
wctomb
CreateTexture
HrIndexOfWeek
IsHttpUrlA
Restore
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ