a1aaaaa
aa1aaaa
aaa2aaa
aaaaa1a
Static task
static1
Behavioral task
behavioral1
Sample
c528e39d1da9e8d79dbb9696ee10364965f520e5bd55964bf05aeb1a964a3c6a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c528e39d1da9e8d79dbb9696ee10364965f520e5bd55964bf05aeb1a964a3c6a.exe
Resource
win10v2004-20220812-en
Target
c528e39d1da9e8d79dbb9696ee10364965f520e5bd55964bf05aeb1a964a3c6a
Size
26KB
MD5
4d0235d9954c70b64d9cdfd4c0651bf7
SHA1
0c0ae21a1092542c39614a262477e63ee5aa497b
SHA256
c528e39d1da9e8d79dbb9696ee10364965f520e5bd55964bf05aeb1a964a3c6a
SHA512
59df9e51d870fd21c7ce631c1ffd762e9cd79bc3b0b2f83253185bb63976b3f21176d9397a216f46a5e44e3221a92ca84fdd2eb28460fe68dedbc16f04fec7f8
SSDEEP
384:t4qyYx6aD3YKSpPg2VqLZ5z5RUjPBS8awCe8DYoAFwv8Y6qWh4C9/1YYMZ:tS86O3YKkPg2gRUjPBD48w07h4eYN
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetSystemDirectoryA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
GetCurrentProcess
OutputDebugStringA
CreateProcessA
ExitProcess
DeleteFileA
ReleaseMutex
OpenMutexA
InterlockedExchange
CreateThread
Sleep
WaitForSingleObject
GetLastError
CreateMutexA
SetPriorityClass
GetModuleFileNameA
GetStartupInfoA
ResumeThread
SetThreadPriority
GetCurrentThread
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
SetFileAttributesA
CopyFileA
lstrcmpiA
GetModuleHandleA
SetErrorMode
VirtualAlloc
VirtualQueryEx
ReadProcessMemory
GetThreadContext
TerminateProcess
SetThreadContext
WriteProcessMemory
VirtualProtectEx
VirtualFree
ReadFile
GetFileSize
SetFilePointer
CreateFileA
GlobalFree
GlobalAlloc
GetSystemDefaultUILanguage
GlobalMemoryStatusEx
GetVersionExA
GetTickCount
RaiseException
LocalAlloc
GetCurrentProcessId
sprintf
memmove
??3@YAXPAX@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
strcspn
strncpy
atoi
??2@YAPAXI@Z
strstr
a1aaaaa
aa1aaaa
aaa2aaa
aaaaa1a
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ