?IjowKhMxWoiFajkhvqza@@YGXN@Z
?ibJkgZulkuBUptPY@@YGEDPAH@Z
?caLujbRbumvue@@YGGPAG@Z
?iUxzwRo@@YGKJ@Z
?Gtwilbrvtujseuhw@@YGMPAMPAI@Z
Static task
static1
Behavioral task
behavioral1
Sample
fae3a67f048d3add7f52843e71a9b5ddc9c456f812f0c31b15a04f908aa4a07a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fae3a67f048d3add7f52843e71a9b5ddc9c456f812f0c31b15a04f908aa4a07a.exe
Resource
win10v2004-20220812-en
Target
fae3a67f048d3add7f52843e71a9b5ddc9c456f812f0c31b15a04f908aa4a07a
Size
114KB
MD5
464a00215433927e728019a4e02d3e16
SHA1
903e818ec6eaeaaaf3d11b1bdf2490d749b356d8
SHA256
fae3a67f048d3add7f52843e71a9b5ddc9c456f812f0c31b15a04f908aa4a07a
SHA512
91ed4b32f913f14ef0f04fb665585be9c55727721d9837be0ad427358d6c08bc7dd9cd46789429019f04fc616b97d3a738420cafc9d02c69409bdd2366f2ee72
SSDEEP
3072:rF5obDv5OnIbSg/cm8GaWLQjbyBmKt6rXZi:5oU+7UmlwygK0Z
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ChooseFontW
PrintDlgExW
PageSetupDlgW
LoadAcceleratorsW
IsCharLowerA
wsprintfA
GetActiveWindow
GetClassLongA
GetAsyncKeyState
GetMessageA
GetSystemMenu
SendMessageTimeoutW
SendDlgItemMessageW
CharLowerA
EnableScrollBar
CharUpperA
SetCursorPos
CreateEllipticRgnIndirect
GetBkMode
SetPixel
GetNearestColor
LPtoDP
RoundRect
CreatePen
SetROP2
GetSystemDefaultLCID
CreatePipe
lstrlenA
CreateMailslotW
DefineDosDeviceW
GetSystemDirectoryA
SetLastError
TerminateThread
GetStartupInfoA
SetMailslotInfo
CopyFileW
lstrcatA
IsValidLocale
?IjowKhMxWoiFajkhvqza@@YGXN@Z
?ibJkgZulkuBUptPY@@YGEDPAH@Z
?caLujbRbumvue@@YGGPAG@Z
?iUxzwRo@@YGKJ@Z
?Gtwilbrvtujseuhw@@YGMPAMPAI@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ