_M0Xyvk0ssSA@8
R8LHscaH83Q@24
wFDEMey2ihCoJ
_H1Qz5p@12
doOMcz5PtUn9T
_9K5R_@12
_SnB1mph
a6uIH_ZL4r
Static task
static1
Behavioral task
behavioral1
Sample
e95ae6880042b77b4b5a69429a3c2afc7dc77e9b62814e485c9802ecf4de2994.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e95ae6880042b77b4b5a69429a3c2afc7dc77e9b62814e485c9802ecf4de2994.exe
Resource
win10v2004-20220901-en
Target
e95ae6880042b77b4b5a69429a3c2afc7dc77e9b62814e485c9802ecf4de2994
Size
133KB
MD5
7c990534b97da649deff7be2d49f08ec
SHA1
f66c84bcf0ef79b5ade1a34ad997c3572a158d1d
SHA256
e95ae6880042b77b4b5a69429a3c2afc7dc77e9b62814e485c9802ecf4de2994
SHA512
237e1e37ac620ca9deb5065790fa7fe2780235278d874f29e0fe1979ffab77133d4a9452b67680f483f69447cad7a41294980204fd7ddcfded618689c77fbb62
SSDEEP
3072:oq/KVgm4n5V4tveGCjmEeBrcIxfq93mNHxxrcqNYUYuDfBbJ9Ji1:JKVgDnTasKwGfc3fUYUYuDfX9J
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
wcstol
mbstowcs
memset
malloc
wcschr
atol
rand
sqrt
srand
tolower
clock
_acmdln
GetBkColor
GetObjectA
SetBkMode
GetPixel
ReleaseDC
IsDlgButtonChecked
SetPropA
DrawAnimatedRects
MsgWaitForMultipleObjects
PostMessageA
LoadIconA
SetWindowTextA
CharLowerA
UpdateWindow
SetScrollPos
IsMenu
DestroyIcon
IsWindow
GetWindow
GetMenu
SetWindowPlacement
GetActiveWindow
BeginPaint
GetWindowThreadProcessId
PostQuitMessage
ScrollWindow
DispatchMessageA
ShowWindow
IsIconic
GetParent
IsRectEmpty
RemoveMenu
EnumChildWindows
TranslateMDISysAccel
SetCapture
SetMenuItemInfoA
CreateMenu
WindowFromPoint
GetSysColor
GetKeyboardState
GetMenuItemInfoA
InflateRect
DrawFrameControl
GetSubMenu
CloseClipboard
WaitMessage
DrawTextA
OemToCharA
CharNextA
GetMenuStringA
GetWindowTextA
GetSysColorBrush
GetScrollRange
EnableMenuItem
ClientToScreen
GetForegroundWindow
EmptyClipboard
FindWindowA
ChildWindowFromPoint
GetDCEx
DrawEdge
GetWindowTextLengthA
IsCharUpperA
EnumThreadWindows
GetIconInfo
SystemParametersInfoA
InsertMenuItemA
VirtualAlloc
ResetEvent
CreateFileA
IsBadReadPtr
lstrcpyA
ExitProcess
GetStartupInfoA
lstrcpynA
GetOEMCP
LocalAlloc
DeleteFileA
HeapDestroy
GetCurrentThread
LocalFree
VirtualAllocEx
WriteFile
GetLocalTime
MoveFileA
lstrlenA
GetCommandLineA
FindResourceA
LoadLibraryA
GetACP
SetHandleCount
GetProcAddress
_M0Xyvk0ssSA@8
R8LHscaH83Q@24
wFDEMey2ihCoJ
_H1Qz5p@12
doOMcz5PtUn9T
_9K5R_@12
_SnB1mph
a6uIH_ZL4r
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ