overlap_free
overlap_malloc
pool_free
pool_malloc
vp_free
vp_malloc
Static task
static1
Behavioral task
behavioral1
Sample
c5a0e8c2e91440dc8cadb814d9176fc4dae4becc368e3dc7dfd7d0ecc5536d99.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c5a0e8c2e91440dc8cadb814d9176fc4dae4becc368e3dc7dfd7d0ecc5536d99.exe
Resource
win10v2004-20230220-en
Target
c5a0e8c2e91440dc8cadb814d9176fc4dae4becc368e3dc7dfd7d0ecc5536d99
Size
333KB
MD5
7816b9149afa7de7a32840b3c09b6b5b
SHA1
3141a598558971eb6a35075ed597128abe561a29
SHA256
c5a0e8c2e91440dc8cadb814d9176fc4dae4becc368e3dc7dfd7d0ecc5536d99
SHA512
46a3cc2984311f9de41287fb5fe3f92492ae54a706ba101920071c397bbe39bf8ff0f29178661da03b0ed2a849c6f237e45511141eb2f246aaf3a8ab2dce6c9f
SSDEEP
6144:2348QL1SzX5Nu8LmGElwfY+Bh82bLe9iRN:QxzfElww+Bh82bV
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcessImageFileNameA
DestroyEnvironmentBlock
CreateEnvironmentBlock
GlobalFlags
GlobalAddAtomA
lstrcmpW
GlobalFindAtomA
ReadFile
FlushFileBuffers
GetCurrentProcess
GetCPInfo
GetOEMCP
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoA
RtlUnwind
GetTimeFormatA
GetDateFormatA
RaiseException
HeapSize
HeapReAlloc
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetSystemTimeAsFileTime
GlobalGetAtomNameA
LocalReAlloc
GlobalHandle
GlobalReAlloc
LocalAlloc
GetModuleFileNameW
GetModuleHandleW
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
CompareStringA
lstrcmpA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
InterlockedExchange
QueryPerformanceCounter
QueryPerformanceFrequency
FindResourceExA
Thread32First
OpenThread
SuspendThread
Thread32Next
ResumeThread
GetVersionExA
LoadLibraryA
FreeLibrary
GetTempPathA
TlsFree
TlsGetValue
TlsAlloc
TlsSetValue
HeapAlloc
HeapFree
VirtualFree
VirtualAlloc
InterlockedDecrement
HeapCreate
GetPrivateProfileIntA
FindFirstFileA
CompareFileTime
FindNextFileA
FindClose
GetFileAttributesA
SetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
OutputDebugStringA
SetFilePointer
WriteFile
CreateFileA
GetFileSize
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
CreateThread
GetCurrentThreadId
GetCurrentProcessId
DeleteCriticalSection
InitializeCriticalSection
CreateEventA
GetCommandLineA
lstrcpynA
SetCurrentDirectoryA
GetCurrentDirectoryA
OpenEventA
GetSystemInfo
TerminateProcess
GetProcAddress
GetModuleHandleA
SetEvent
lstrcatA
LockResource
MoveFileA
CopyFileA
CreateProcessA
GetPrivateProfileStringA
WritePrivateProfileStringA
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
Sleep
GetTickCount
DeleteFileA
SizeofResource
LoadResource
FindResourceA
GetLastError
GetModuleFileNameA
WideCharToMultiByte
WaitForSingleObject
lstrlenA
CloseHandle
GetProcessHeap
GetTimeZoneInformation
DestroyMenu
ShowWindow
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetDlgItem
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
GetClientRect
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
CopyRect
CallWindowProcA
GetMenu
SetWindowLongA
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
ClientToScreen
GrayStringA
PostMessageA
DefWindowProcA
DestroyWindow
DispatchMessageA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
PeekMessageA
CreateWindowExA
RegisterClassExA
GetClassInfoA
MessageBoxA
IsIconic
SendInput
AttachThreadInput
GetWindowThreadProcessId
FindWindowA
SetForegroundWindow
SetWindowPos
BringWindowToTop
GetForegroundWindow
IsWindow
GetSubMenu
GetMenuItemCount
GetWindowTextA
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
PostQuitMessage
GetMenuState
GetMenuItemID
GetStockObject
OffsetViewportOrgEx
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
CreateBitmap
GetDeviceCaps
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
SetViewportExtEx
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegSetValueExA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueA
RegOpenKeyA
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
CreateProcessAsUserA
StartServiceA
ControlService
QueryServiceStatus
CloseServiceHandle
OpenServiceA
OpenSCManagerA
SHGetSpecialFolderPathA
SHGetValueA
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
CoCreateGuid
StringFromGUID2
SysAllocString
SysFreeString
VariantClear
VariantChangeType
VariantInit
ntohl
gethostname
inet_addr
WSAStartup
gethostbyname
inet_ntoa
htonl
GetAdaptersInfo
overlap_free
overlap_malloc
pool_free
pool_malloc
vp_free
vp_malloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ