Fny
Fzm
Gye
Jaj
Mfk
Mnc
Qwh
Tqp
Vam
Vgv
Xbn
Xqd
Ygl
Static task
static1
Behavioral task
behavioral1
Sample
f6d60d04620c97a62bd2343f5ef1e027122d33b3c07194190e6adc6933d8620d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6d60d04620c97a62bd2343f5ef1e027122d33b3c07194190e6adc6933d8620d.exe
Resource
win10v2004-20220812-en
Target
f6d60d04620c97a62bd2343f5ef1e027122d33b3c07194190e6adc6933d8620d
Size
297KB
MD5
11c70b0c156fbb8fc89365428a33210c
SHA1
e594231e45643f59b0133155d5bad85519270df1
SHA256
f6d60d04620c97a62bd2343f5ef1e027122d33b3c07194190e6adc6933d8620d
SHA512
a707f738c08450870dac5fdddc478f7af39b4ec75c5432095fd65e68d63d269dab8b0ebb1336c38a0b69235c54b1a4d0277eb087ae79554ba0b0fb067b834d0a
SSDEEP
3072:NNqrQ+SWh61zn/fQf+qa3jdmPEMM3JHkGKMMiU1m9:jmh61D/f8edmsMwkGKNP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VariantCopyInd
VariantClear
SysFreeString
SysAllocStringLen
LoadTypeLib
ControlService
StartServiceA
OpenProcessToken
SetSecurityDescriptorDacl
QueryServiceStatus
WriteFmtUserTypeStg
GetRunningObjectTable
GetConvertStg
CoDisconnectObject
CreateDataAdviseHolder
CreateBindCtx
CoTaskMemAlloc
CoGetMalloc
CoGetClassObject
SetCursor
MessageBoxIndirectA
DrawIcon
DefDlgProcA
ShowOwnedPopups
SHGetFileInfoA
SHBindToParent
SHFileOperationA
PathFindExtensionA
PathCompactPathExA
PathCanonicalizeA
PathIsDirectoryA
PathQuoteSpacesA
PathUnquoteSpacesA
time
strstr
sprintf
memchr
rand
fflush
malloc
vsprintf
TlsSetValue
lstrcatA
lstrcpyA
RaiseException
LocalAlloc
GetDateFormatA
FreeResource
FlushFileBuffers
EnumResourceLanguagesA
ReadFile
Fny
Fzm
Gye
Jaj
Mfk
Mnc
Qwh
Tqp
Vam
Vgv
Xbn
Xqd
Ygl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ