_HyperDrive@20
_OpenYourMind@16
Static task
static1
Behavioral task
behavioral1
Sample
a826868e7b3502d6c269f526781468b01b0e2ea6391ac6db01727a014630f4e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a826868e7b3502d6c269f526781468b01b0e2ea6391ac6db01727a014630f4e3.exe
Resource
win10v2004-20220812-en
Target
a826868e7b3502d6c269f526781468b01b0e2ea6391ac6db01727a014630f4e3
Size
92KB
MD5
49bbd367f4e78a7cb3a785575cc044ed
SHA1
577452251184ec197a5ee4cb4888eb78c54d03a8
SHA256
a826868e7b3502d6c269f526781468b01b0e2ea6391ac6db01727a014630f4e3
SHA512
1121b1ec4ed47d957fa7adeae2b2285b2cccd7cc596fcbcd4f571fd151e68a7e67879ccabd50ca968d5484c02c0ffb621791dbb1430b041a7e8c4075ee476c7e
SSDEEP
1536:r3J18ftBvcPIMLTHGqIOG6k+igJfDrXeO/NUUzA6czdCo3MJ08pZ9JlK4HAtho:jJ18ftBvcPIMmflR54/OO/LzA6WMdhJD
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
CoGetClassObject
CoTaskMemFree
CoGetMalloc
CoTaskMemAlloc
CreateNamedPipeA
HeapAlloc
GetProcessHeap
ExitProcess
MoveFileExA
HeapFree
WriteFile
OpenProcess
CompareStringW
LoadLibraryA
GetCurrentProcessId
WriteProcessMemory
CloseHandle
DrawEdge
CreateMenu
LoadBitmapA
ShowCursor
SetCursor
MoveWindow
GetForegroundWindow
SetWindowLongA
GetWindow
ShowWindow
PostMessageA
GetCursor
SetWindowTextW
ModifyMenuA
DrawTextA
GetDC
ReleaseDC
GetActiveWindow
GetWindowRect
CreateWindowExA
SetWindowTextA
GetWindowLongA
GetPath
CreateDIBPatternBrush
BeginPath
GetBitmapBits
ExtCreatePen
SetBitmapBits
InvertRgn
CreateFontIndirectW
CreateDCA
DeleteObject
SelectObject
PolyDraw
CreateCompatibleDC
CreateCompatibleBitmap
EndPath
PathToRegion
ExtTextOutA
MaskBlt
CreateBitmap
SetMapMode
CreateFontIndirectExW
DrawEscape
DeleteDC
_HyperDrive@20
_OpenYourMind@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ