?EnterSection@@YGDPAK@Z
IdleRangeProtection
Static task
static1
Behavioral task
behavioral1
Sample
84aeafc75a852ebdf99555861d27cbe778698c8b86adeedd9aca4c15584e2887.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84aeafc75a852ebdf99555861d27cbe778698c8b86adeedd9aca4c15584e2887.exe
Resource
win10v2004-20220812-en
Target
84aeafc75a852ebdf99555861d27cbe778698c8b86adeedd9aca4c15584e2887
Size
276KB
MD5
80696f7494e1e97805ae2b3f6bf577d0
SHA1
ec95c3763b14f6392ce86a942c87795cf7cc5ad8
SHA256
84aeafc75a852ebdf99555861d27cbe778698c8b86adeedd9aca4c15584e2887
SHA512
9644e29d429c5f2c0e7ad4177c77da7a252e0103273da4246eb1ae6be396387617e286dc9be4bf12e7a03a69ee9448b0d3e12eebb29da88c8dd1e01407cf65b8
SSDEEP
6144:GAPTXIBhvb/DZpoRvmhkhRZO9ZTR/9EIeP7Do+RtJJCgKsMop88nB:GAPa/1pIvmy/ZiZTN2IejrtJsgNX1n
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ScrollConsoleScreenBufferA
GetCurrentThreadId
GetPrivateProfileSectionA
GetTempPathA
FindFirstVolumeMountPointA
EnumResourceTypesW
GetSystemInfo
GetNumberFormatW
MoveFileA
FindClose
lstrlenA
GetThreadLocale
lstrlenW
GetCompressedFileSizeA
IsDBCSLeadByte
GetConsoleMode
VirtualFree
GetTimeFormatA
CancelWaitableTimer
WritePrivateProfileSectionA
SetConsoleTextAttribute
SystemTimeToFileTime
GlobalAddAtomA
DeleteVolumeMountPointA
GetWindowsDirectoryW
MapVirtualKeyW
DdeCreateStringHandleW
SetCapture
DrawIconEx
CopyImage
DefWindowProcA
ShowWindow
PostMessageA
wvsprintfA
SetDlgItemTextA
DefWindowProcW
CharToOemA
DefMDIChildProcW
CreatePen
CloseMetaFile
GetSystemPaletteEntries
CreateRoundRectRgn
GetTextExtentExPointA
GetTextExtentExPointW
GetMapMode
CreateCompatibleBitmap
RemoveFontResourceW
CreateFontIndirectW
CreateHatchBrush
GetROP2
GetMetaFileBitsEx
ExtFloodFill
GetTextMetricsW
GetTextExtentPoint32W
SetLayout
EnumFontFamiliesW
Polyline
?EnterSection@@YGDPAK@Z
IdleRangeProtection
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE