LogDeviceGetValue
LogNameGetValue
Static task
static1
Behavioral task
behavioral1
Sample
a5858ee334efe5735e8dda6af0d685634647830ad27b46a3bd83ab9655f2821e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a5858ee334efe5735e8dda6af0d685634647830ad27b46a3bd83ab9655f2821e.exe
Resource
win10v2004-20220812-en
Target
a5858ee334efe5735e8dda6af0d685634647830ad27b46a3bd83ab9655f2821e
Size
140KB
MD5
6589da93663b549a1580616719591040
SHA1
9dabd11fe4931f75a871767910a9fd80507d4373
SHA256
a5858ee334efe5735e8dda6af0d685634647830ad27b46a3bd83ab9655f2821e
SHA512
2290186f7cdeeac8b4643f5a83a92a5ede9c71cf64abf40a659a057c5363317bec03a30e7b5a1fcb740c88d099b22cfa706d964650c80a2d69e8fb2211581788
SSDEEP
3072:MnU7gLiukUah+XVmnZf2ex2FuALaOGl3dmI:C22XGZ+30OGlkI
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetEvent
Sleep
CreateEventA
CreateThread
GetModuleHandleA
lstrlenW
LoadLibraryA
CreateMutexA
DeleteFileA
SetFileAttributesA
CopyFileA
WaitForSingleObject
OpenProcess
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
Module32FirstW
Module32NextW
TerminateProcess
WaitForMultipleObjects
GetTickCount
GetExitCodeThread
CreateDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetFileSize
FreeLibrary
GetProcAddress
GetExitCodeProcess
ResumeThread
VirtualProtect
VirtualAlloc
CreateProcessA
GetSystemTimeAsFileTime
GetCurrentThreadId
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetCommState
SetCommState
SetupComm
SetCommTimeouts
PurgeComm
ClearCommError
DeviceIoControl
GetOverlappedResult
CancelIo
OutputDebugStringA
SetThreadPriority
ResetEvent
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetLastError
GetFileTime
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetFullPathNameA
GetVolumeInformationA
lstrcpyA
InterlockedIncrement
InterlockedDecrement
GetVersionExA
lstrlenA
WideCharToMultiByte
MultiByteToWideChar
CreateFileA
GetLastError
QueryPerformanceCounter
CloseHandle
GetWindowLongW
GetWindowThreadProcessId
EnumWindows
PostMessageW
GetSystemMenu
FillRect
EnableWindow
SendMessageA
LoadStringA
GetDlgItem
SetDlgItemTextA
PostMessageA
wsprintfA
GetDlgItemTextA
IsWindowEnabled
DestroyWindow
KillTimer
GetParent
CallWindowProcA
SetWindowLongA
FindWindowA
IsWindowVisible
DefWindowProcA
MessageBoxA
SetForegroundWindow
DialogBoxParamA
UpdateWindow
ShowWindow
IsWindow
CreateDialogParamA
EnableMenuItem
SetWindowTextA
GetMessageA
TranslateMessage
DispatchMessageA
IsDialogMessageA
CreateWindowExA
RegisterClassA
PostQuitMessage
SetFocus
GetWindowRect
GetSystemMetrics
MoveWindow
SetTimer
LoadIconA
CharUpperA
GetBkColor
Polyline
ExtTextOutA
SetTextColor
SetBkColor
CreateSolidBrush
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegCloseKey
RegFlushKey
CoUninitialize
CoCreateInstance
CoInitialize
SysStringLen
SafeArrayGetDim
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
SysFreeString
VariantClear
SysAllocString
VariantInit
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
??3@YAXPAX@Z
??_U@YAPAXI@Z
_purecall
??_V@YAXPAX@Z
strchr
memset
memcpy
__CxxFrameHandler3
strtol
strtok
strpbrk
strrchr
strstr
_strupr
vsprintf
isdigit
atoi
memmove
strncat
sprintf
_stricmp
??2@YAPAXI@Z
_wcsicmp
atol
_strnicmp
strcmp
strncpy
strlen
memcmp
strcpy
strcat
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
WSACleanup
closesocket
WSAGetLastError
WSAStartup
socket
shutdown
send
WSASetLastError
select
recv
accept
setsockopt
listen
ioctlsocket
htons
htonl
bind
SCP_receive
SCP_send
SCP_close
SCP_open
LogDeviceGetValue
LogNameGetValue
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ