@mctraxer@0
@shutting@0
Static task
static1
Behavioral task
behavioral1
Sample
e271392cca5ce0b7e49d70581c192fb740c3756055359b15e991eb07482a5bc6.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
e271392cca5ce0b7e49d70581c192fb740c3756055359b15e991eb07482a5bc6.exe
Resource
win10v2004-20220722-en
Target
e271392cca5ce0b7e49d70581c192fb740c3756055359b15e991eb07482a5bc6
Size
3.8MB
MD5
b8ccdb89d315222b91ceda4d1a2e4520
SHA1
83aafccce18edf3713d48eebd1c399c9d839c9e7
SHA256
e271392cca5ce0b7e49d70581c192fb740c3756055359b15e991eb07482a5bc6
SHA512
0617d4732ebe6cec11bf33c52a1c114abf80a8690faeb8e45b636f8f35c220f8ae202129e81e56445f47f2c3041040c53726df4ad12642d7eb75fbb4cab2e8b0
SSDEEP
98304:GAbPEhiaujzJy54KR31FK7K4oQrlplpPdQn8Pu3MkCF:RbMMaujzJS4c31g1lhdQn8Pu3c
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteConsoleOutputCharacterW
lstrlenA
RtlCaptureContext
DeleteVolumeMountPointA
SetThreadExecutionState
GetTickCount
GetCommConfig
GlobalAlloc
WideCharToMultiByte
SizeofResource
GetSystemWindowsDirectoryA
FindNextVolumeW
GetAtomNameW
IsBadStringPtrW
DisconnectNamedPipe
FindFirstFileExA
EnumSystemCodePagesW
LoadLibraryA
ProcessIdToSessionId
IsWow64Process
BuildCommDCBAndTimeoutsW
SetConsoleCtrlHandler
VirtualProtect
PurgeComm
CompareStringA
GetCurrentProcessId
SetupComm
SetVolumeLabelA
IsDBCSLeadByte
HeapReAlloc
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
SetFilePointer
CloseHandle
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
CreateFileA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleW
CreateFileW
EnumServicesStatusA
RegisterEventSourceA
RegQueryValueExW
@mctraxer@0
@shutting@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ