QQ841374296
ffffffff
gadsfas
ggggggggg
wwwwwwwww
xxxxxxxxx
zxsahduo
Static task
static1
Behavioral task
behavioral1
Sample
1318c9b8b26a9503ba4a86a66bf066eec6200bd5df34de4e0a089111ddd2894c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1318c9b8b26a9503ba4a86a66bf066eec6200bd5df34de4e0a089111ddd2894c.exe
Resource
win10v2004-20220812-en
Target
1318c9b8b26a9503ba4a86a66bf066eec6200bd5df34de4e0a089111ddd2894c
Size
280KB
MD5
bad85203dd025ddc652efb987a117b16
SHA1
97b627dcf906301a0c09193a0173e8f0ef70785f
SHA256
1318c9b8b26a9503ba4a86a66bf066eec6200bd5df34de4e0a089111ddd2894c
SHA512
e08a95f02e909bf6f397607941d09758e1a5dd4a24aa721d59603ac614e88a2da02347e7cc7ba4a4c81b43bf1b51911bfbda5be8b6e37783d00ac0e618f74ad7
SSDEEP
6144:l6DzECa/Ha9rZ4zgoYv67kGIvjQE6B6C7hCB200K:l+daC/PPuovjQbB20K
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedExchange
LocalAlloc
CreateToolhelp32Snapshot
Process32Next
OpenProcess
LocalSize
CreateMutexA
MoveFileExA
CopyFileA
SetFileAttributesA
OpenEventA
CloseHandle
GetSystemInfo
WaitForSingleObject
GetProcessHeap
SetEvent
CreateEventA
GetModuleFileNameA
WinExec
ExitProcess
MultiByteToWideChar
GetTickCount
ExitThread
CreateThread
GetCurrentProcess
GetVersionExA
lstrcatA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
LocalReAlloc
FindNextFileA
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
OutputDebugStringA
lstrcpyA
Sleep
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
LocalFree
SetLastError
lstrcpynA
InitializeCriticalSection
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
TlsSetValue
TlsGetValue
GetVersion
GetCurrentThreadId
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
FreeLibrary
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
FlushFileBuffers
RtlUnwind
RaiseException
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapReAlloc
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapSize
TerminateProcess
GetACP
SetUnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LoadLibraryA
GetProcAddress
DispatchMessageA
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetWindowRect
GetWindowPlacement
IsIconic
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
GetWindow
SetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
DestroyWindow
GetDlgCtrlID
GetDlgItem
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
CallNextHookEx
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
LoadStringA
wsprintfA
ExitWindowsEx
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
DestroyCursor
SendMessageA
PeekMessageA
SetWindowsHookExA
UnhookWindowsHookEx
GetParent
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
GetInputState
PostThreadMessageA
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SetCursorPos
WindowFromPoint
SetCapture
mouse_event
MapVirtualKeyA
keybd_event
SystemParametersInfoA
GetLastActivePopup
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetViewportExtEx
GetStockObject
ScaleViewportExtEx
CreateBitmap
Escape
ExtTextOutA
TextOutA
RestoreDC
PtVisible
ScaleWindowExtEx
SetWindowExtEx
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
SaveDC
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
RectVisible
GetUserNameA
ControlService
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegCreateKeyExA
RegSetValueExA
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumKeyExA
GetTokenInformation
LookupAccountSidA
RegQueryValueExA
CreateServiceA
DeleteService
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyA
RegDeleteKeyA
RegDeleteValueA
SHGetSpecialFolderPathA
SHGetFileInfoA
ord17
NetUserAdd
NetLocalGroupAddMembers
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
capGetDriverDescriptionA
capCreateCaptureWindowA
WTSQuerySessionInformationA
WTSFreeMemory
ClosePrinter
DocumentPropertiesA
OpenPrinterA
QQ841374296
ffffffff
gadsfas
ggggggggg
wwwwwwwww
xxxxxxxxx
zxsahduo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ