?EnterSection@@YGDPAK@Z
IdleRangeProtection
Static task
static1
Behavioral task
behavioral1
Sample
63db309e08d585a80025f8a059a2543e912af6e26f57189f3511db389855d035.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63db309e08d585a80025f8a059a2543e912af6e26f57189f3511db389855d035.exe
Resource
win10v2004-20220812-en
Target
63db309e08d585a80025f8a059a2543e912af6e26f57189f3511db389855d035
Size
276KB
MD5
4370653400c64e90e8de9785da3a5c00
SHA1
8006c8b0fc9752f5d36ccb07f76a1ad04406827e
SHA256
63db309e08d585a80025f8a059a2543e912af6e26f57189f3511db389855d035
SHA512
00f46dd8cae81b9622dfba8cb8a27f79d0b7d078b7c27a661408841287b7e29e1234b843789b9f2bd85e61dda15b3eb862cca3685b016a185158df579628b617
SSDEEP
6144:GAPTXIBhvb/DZpoRvmhkhRZO9ZTR/9EIeP7Do+RtJJCgKsMop88n:GAPa/1pIvmy/ZiZTN2IejrtJsgNX1n
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ScrollConsoleScreenBufferA
GetCurrentThreadId
GetPrivateProfileSectionA
GetTempPathA
FindFirstVolumeMountPointA
EnumResourceTypesW
GetSystemInfo
GetNumberFormatW
MoveFileA
FindClose
lstrlenA
GetThreadLocale
lstrlenW
GetCompressedFileSizeA
IsDBCSLeadByte
GetConsoleMode
VirtualFree
GetTimeFormatA
CancelWaitableTimer
WritePrivateProfileSectionA
SetConsoleTextAttribute
SystemTimeToFileTime
GlobalAddAtomA
DeleteVolumeMountPointA
GetWindowsDirectoryW
MapVirtualKeyW
DdeCreateStringHandleW
SetCapture
DrawIconEx
CopyImage
DefWindowProcA
ShowWindow
PostMessageA
wvsprintfA
SetDlgItemTextA
DefWindowProcW
CharToOemA
DefMDIChildProcW
CreatePen
CloseMetaFile
GetSystemPaletteEntries
CreateRoundRectRgn
GetTextExtentExPointA
GetTextExtentExPointW
GetMapMode
CreateCompatibleBitmap
RemoveFontResourceW
CreateFontIndirectW
CreateHatchBrush
GetROP2
GetMetaFileBitsEx
ExtFloodFill
GetTextMetricsW
GetTextExtentPoint32W
SetLayout
EnumFontFamiliesW
Polyline
?EnterSection@@YGDPAK@Z
IdleRangeProtection
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE