GetHandleVerifier
IsSandboxedProcess
Static task
static1
Behavioral task
behavioral1
Sample
bb10e81e2d186170e149ff6912a9a3274b119f30dd21b8f2dca02776e0fabc2b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb10e81e2d186170e149ff6912a9a3274b119f30dd21b8f2dca02776e0fabc2b.exe
Resource
win10v2004-20220812-en
Target
bb10e81e2d186170e149ff6912a9a3274b119f30dd21b8f2dca02776e0fabc2b
Size
1.0MB
MD5
573cdbe66be5330aebd2be100b58f0fc
SHA1
005678cca02d11a6d8fc366033040bbeb306202d
SHA256
bb10e81e2d186170e149ff6912a9a3274b119f30dd21b8f2dca02776e0fabc2b
SHA512
5d79465757ccfcba355781787513eb8df4e2e8361d549544656bd92c2438ac4af04682e5978fcab3e802544e855ca4e00fdf5cd42b4bc254af543424900cf381
SSDEEP
12288:xRTFL1vB1jgdHlQltKXR2R2xjm9hZuyVRzINkjogkT8Bny3OI0xdXbgVhAE:xRTFL1ZoQl0mvdzzykNkTkn20xdEnAE
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameExW
EnumProcessModules
GetProcessImageFileNameW
GetAdaptersInfo
LocalFree
SetErrorMode
ReadProcessMemory
GetTempPathW
CreateDirectoryW
CreateFileW
InterlockedCompareExchange
FlushInstructionCache
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
GetThreadContext
SetThreadContext
HeapSetInformation
VirtualAllocEx
VirtualQueryEx
GetModuleHandleA
GetFileAttributesW
GetLongPathNameW
QueryDosDeviceW
VirtualProtectEx
WriteProcessMemory
DuplicateHandle
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
InitializeCriticalSection
ResetEvent
CreateThread
GetProcessId
UnregisterWaitEx
TerminateJobObject
SetInformationJobObject
RegisterWaitForSingleObject
GetUserDefaultLangID
GetUserDefaultLCID
AssignProcessToJobObject
GetFileType
ProcessIdToSessionId
SetHandleInformation
GetProcessHandleCount
SignalObjectAndWait
CreateMutexW
VirtualFreeEx
GetModuleHandleExW
CreateJobObjectW
CreateNamedPipeW
DebugBreak
GetCurrentDirectoryW
SearchPathW
GetNativeSystemInfo
IsDebuggerPresent
WriteFile
ReadFile
GetCommandLineW
QueryPerformanceFrequency
GetSystemTimeAsFileTime
GetSystemInfo
SetFilePointerEx
FlushFileBuffers
FindFirstFileExW
FindNextFileW
FindClose
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
GetProcessTimes
ConnectNamedPipe
DisconnectNamedPipe
GetOverlappedResult
ReleaseMutex
UnregisterWait
RtlCaptureContext
SetUnhandledExceptionFilter
SetCurrentDirectoryW
CreateSemaphoreW
SetNamedPipeHandleState
TransactNamedPipe
WaitNamedPipeW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
WriteConsoleW
EnumSystemLocalesW
IsValidLocale
GetACP
GetStdHandle
SetStdHandle
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
ExitProcess
FreeLibraryAndExitThread
ExitThread
RtlUnwind
GetCPInfo
GetLocaleInfoW
LCMapStringW
GetStringTypeW
GetStartupInfoW
UnhandledExceptionFilter
WaitForSingleObjectEx
OutputDebugStringW
LoadLibraryExA
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
GlobalMemoryStatusEx
SwitchToThread
LoadLibraryW
InterlockedExchange
GetExitCodeProcess
WaitForMultipleObjects
ResumeThread
SuspendThread
lstrlenW
CompareStringW
GetVersionExW
GetLocalTime
GlobalAddAtomW
GetCurrentProcess
SetEvent
CreateEventW
MapViewOfFile
CreateFileMappingW
UnmapViewOfFile
GetCurrentThread
DecodePointer
GetCommandLineA
LoadLibraryExW
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
CreateProcessW
TerminateProcess
CloseHandle
OpenProcess
GetCurrentProcessId
GetVolumeInformationA
GetTickCount
WaitForSingleObject
WideCharToMultiByte
GetModuleFileNameW
GlobalUnlock
GlobalFree
MultiByteToWideChar
GlobalLock
GlobalAlloc
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
SetLastError
RaiseException
InitializeCriticalSectionAndSpinCount
GetLastError
InterlockedDecrement
InterlockedIncrement
Sleep
MulDiv
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
GetUserDefaultUILanguage
QueryPerformanceCounter
UpdateWindow
MonitorFromPoint
LoadMenuW
TrackPopupMenu
PtInRect
ReleaseCapture
GetCapture
SetCapture
SetFocus
DefWindowProcW
DestroyWindow
SetWindowLongW
GetWindowLongW
CallWindowProcW
UnregisterClassW
DestroyAcceleratorTable
ReleaseDC
GetDC
SetCursor
GetClientRect
RedrawWindow
GetSubMenu
SetMenuItemInfoW
SetRectEmpty
GetClassNameW
DrawTextW
OffsetRect
DialogBoxParamW
DestroyMenu
GetCursorPos
RegisterHotKey
UnregisterHotKey
PostQuitMessage
GetDlgCtrlID
EnableWindow
GetActiveWindow
LoadImageW
MessageBoxW
IsDialogMessageW
RegisterWindowMessageW
ExitWindowsEx
DrawFocusRect
EmptyClipboard
GetFocus
GetSysColor
IsWindowEnabled
FillRect
EndPaint
BeginPaint
SetDlgItemInt
GetDlgItemInt
OpenClipboard
CloseClipboard
SetClipboardData
InvalidateRect
KillTimer
SetTimer
IsWindowVisible
CreateDialogParamW
SetForegroundWindow
CreateAcceleratorTableW
SystemParametersInfoW
GetParent
ClientToScreen
ScreenToClient
MoveWindow
GetDlgItem
IsWindow
SendMessageW
RegisterClassExW
GetClassInfoExW
LoadCursorW
CreateWindowExW
CreateDesktopW
CloseDesktop
EnumDesktopWindows
GetWindowThreadProcessId
SendMessageTimeoutW
ShowWindow
GetWindow
SetWindowPos
MapWindowPoints
GetWindowRect
GetMonitorInfoW
MonitorFromWindow
GetWindowTextW
GetWindowTextLengthW
SetDlgItemTextW
PostMessageW
PeekMessageW
GetMessageW
CloseWindowStation
GetThreadDesktop
CreateWindowStationW
SetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
GetSystemMetrics
SetWindowTextW
EndDialog
CharNextW
DispatchMessageW
TranslateMessage
SelectObject
SetBkMode
SetTextColor
GetStockObject
CreateFontIndirectW
GetObjectW
StretchBlt
GetTextMetricsW
SetViewportOrgEx
CreateCompatibleDC
BitBlt
GetTextExtentPoint32W
SetBkColor
ExtTextOutW
RestoreDC
SaveDC
CreatePen
LineTo
MoveToEx
DeleteDC
DeleteObject
CreateCompatibleBitmap
GetTextMetricsA
CreateFontW
GetTextExtentPointA
GetDeviceCaps
RegCloseKey
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
CreateProcessAsUserW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
InitiateSystemShutdownW
RegQueryValueExW
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetAce
GetKernelObjectSecurity
GetLengthSid
SetKernelObjectSecurity
SetTokenInformation
SetSecurityInfo
ConvertStringSidToSidW
SystemFunction036
RevertToSelf
RegDisablePredefinedCache
CopySid
CreateWellKnownSid
CreateRestrictedToken
DuplicateToken
DuplicateTokenEx
EqualSid
GetTokenInformation
SetThreadToken
ConvertSidToStringSidW
SetEntriesInAclW
GetSecurityInfo
ShellExecuteW
Shell_NotifyIconW
CoCreateGuid
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoInitialize
CoCreateInstance
CreateStreamOnHGlobal
OleLockRunning
CoGetClassObject
CoInitializeEx
VariantClear
SysAllocString
VariantInit
VariantCopy
SysStringLen
LoadRegTypeLi
LoadTypeLi
SysAllocStringLen
VariantChangeType
VarUI4FromStr
SafeArrayCreateVector
SafeArrayDestroy
VARIANT_UserSize
VARIANT_UserMarshal
VARIANT_UserUnmarshal
VARIANT_UserFree
SysFreeString
PathFileExistsW
PathAppendW
StrCpyW
SHDeleteValueW
PathRemoveFileSpecW
SHGetValueW
StrCpyNW
StrStrIW
StrStrIA
PathAddExtensionW
PathFileExistsA
PathRemoveExtensionW
SHSetValueW
PathFindFileNameW
_TrackMouseEvent
InitCommonControlsEx
ImageList_Create
WSACloseEvent
WSACleanup
closesocket
WSAStartup
WSASocketW
getaddrinfo
WSASetLastError
WSAGetLastError
WSASend
WSAEventSelect
WSASetEvent
WSACreateEvent
WSARecv
WSAGetOverlappedResult
freeaddrinfo
WSAResetEvent
WSAEnumNetworkEvents
WSAConnect
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
timeGetTime
RpcMgmtStopServerListening
RpcServerUseProtseqEpW
RpcServerUnregisterIf
RpcServerRegisterIfEx
RpcServerListen
NdrServerCall2
GdipAlloc
GdipFree
GdiplusStartup
GdipCloneImage
GdipDisposeImage
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStream
GetHandleVerifier
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ