_HyperDrive@20
_OpenYourMind@16
Static task
static1
Behavioral task
behavioral1
Sample
1a26626a0080b0431edf234a476cb599dc0acf70fed258b55a666023ae8791c3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1a26626a0080b0431edf234a476cb599dc0acf70fed258b55a666023ae8791c3.exe
Resource
win10v2004-20220812-en
Target
1a26626a0080b0431edf234a476cb599dc0acf70fed258b55a666023ae8791c3
Size
91KB
MD5
4e9371df4a1e7dcc2d4125d500f5ab53
SHA1
7997c185e53039939554302e020ad79f1aaf3744
SHA256
1a26626a0080b0431edf234a476cb599dc0acf70fed258b55a666023ae8791c3
SHA512
a44357d0ba00cc64f8774db71f7e13b1b5ff62cddfb832df8336498b45312dad8679488e5c3c510c22f6186e551fce823ec8b636bdb242f2f871fc5586976046
SSDEEP
1536:U3J18ftBLJPIMLTpGqE5F55JkDHkSCJ4bKZ8w0KUR6VcdCo3MJ08pZ9JlK4HAthV:SJ18ftBLJPIMcXfJuHklJu6ViMdhJwgM
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
CoGetClassObject
CoTaskMemFree
CoGetMalloc
CoTaskMemAlloc
CreateNamedPipeA
HeapAlloc
GetProcessHeap
ExitProcess
MoveFileExA
HeapFree
WriteFile
OpenProcess
CompareStringW
LoadLibraryA
GetCurrentProcessId
WriteProcessMemory
CloseHandle
DrawEdge
CreateMenu
LoadBitmapA
ShowCursor
SetCursor
MoveWindow
GetForegroundWindow
SetWindowLongA
GetWindow
ShowWindow
PostMessageA
GetCursor
SetWindowTextW
ModifyMenuA
DrawTextA
GetDC
ReleaseDC
GetActiveWindow
GetWindowRect
CreateWindowExA
SetWindowTextA
GetWindowLongA
GetPath
CreateDIBPatternBrush
BeginPath
GetBitmapBits
ExtCreatePen
SetBitmapBits
InvertRgn
CreateFontIndirectW
CreateDCA
DeleteObject
SelectObject
PolyDraw
CreateCompatibleDC
CreateCompatibleBitmap
EndPath
PathToRegion
ExtTextOutA
MaskBlt
CreateBitmap
SetMapMode
CreateFontIndirectExW
DrawEscape
DeleteDC
_HyperDrive@20
_OpenYourMind@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ