_HyperDrive@20
_OpenYourMind@16
Static task
static1
Behavioral task
behavioral1
Sample
eff037c63aeb2512215a9e7cae207dada493e3252892a711c27c8feef868980c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eff037c63aeb2512215a9e7cae207dada493e3252892a711c27c8feef868980c.exe
Resource
win10v2004-20220812-en
Target
eff037c63aeb2512215a9e7cae207dada493e3252892a711c27c8feef868980c
Size
91KB
MD5
ef263772bbceaff0cf93cd8b471bdd3a
SHA1
e7c2c87f54966a3ba1b477d929eb1c8d3ec4cf53
SHA256
eff037c63aeb2512215a9e7cae207dada493e3252892a711c27c8feef868980c
SHA512
fd905aa6f38563a4418c983a7f549da2e10f3575ef0afbf81eaac8fe21e2f66e5700428b18bd442fd0a2e7043184e1c71a2e155e8b25a857bae061cb4a6a2fb3
SSDEEP
1536:Q3J18ftBLpPIMLT3GqmNqaOQNYCgYiJEWQwH5qPddCo3MJ08pZ9JlK4HAtho:mJ18ftBLpPIMWfqHQNYCgYiJENP/Mdhl
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
CoGetClassObject
CoTaskMemFree
CoGetMalloc
CoTaskMemAlloc
CreateNamedPipeA
HeapAlloc
GetProcessHeap
ExitProcess
MoveFileExA
HeapFree
WriteFile
OpenProcess
CompareStringW
LoadLibraryA
GetCurrentProcessId
WriteProcessMemory
CloseHandle
DrawEdge
CreateMenu
LoadBitmapA
ShowCursor
SetCursor
MoveWindow
GetForegroundWindow
SetWindowLongA
GetWindow
ShowWindow
PostMessageA
GetCursor
SetWindowTextW
ModifyMenuA
DrawTextA
GetDC
ReleaseDC
GetActiveWindow
GetWindowRect
CreateWindowExA
SetWindowTextA
GetWindowLongA
GetPath
CreateDIBPatternBrush
BeginPath
GetBitmapBits
ExtCreatePen
SetBitmapBits
InvertRgn
CreateFontIndirectW
CreateDCA
DeleteObject
SelectObject
PolyDraw
CreateCompatibleDC
CreateCompatibleBitmap
EndPath
PathToRegion
ExtTextOutA
MaskBlt
CreateBitmap
SetMapMode
CreateFontIndirectExW
DrawEscape
DeleteDC
_HyperDrive@20
_OpenYourMind@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ