AlphaBlend
GradientFill
TransparentBlt
Static task
static1
Behavioral task
behavioral1
Sample
63a3c6b3d1972cf0bcd67389682d48e9276935d7a3fe30b1490eed67e11b0605.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
63a3c6b3d1972cf0bcd67389682d48e9276935d7a3fe30b1490eed67e11b0605.exe
Resource
win10v2004-20220901-en
Target
63a3c6b3d1972cf0bcd67389682d48e9276935d7a3fe30b1490eed67e11b0605
Size
180KB
MD5
a2b75bb3d268357b636dd87c7ac858a0
SHA1
4165972715e41cd235f3909c74809f64be3d3cc4
SHA256
63a3c6b3d1972cf0bcd67389682d48e9276935d7a3fe30b1490eed67e11b0605
SHA512
cd63f6ebeec4c7ead3c5c758ec4ed5aa64af71c623de9a854ad246dc6aed484639ad529f22f28b0c994a28dd8cf3492aea7ce71c68634cae9e32be57e7b113be
SSDEEP
3072:r14JKADiXWKc5eDNPsRUKEygjPDmGhtxNhnCQqRMlyb6r5hJUi+gEHLhEXGNX:rLA2XqeBPsRUK6zyG7CnSvmi+gYLqXu
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ZwQueryInformationProcess
ZwOpenProcess
ZwDuplicateObject
ZwOpenFile
ZwWriteFile
ZwDelayExecution
ZwGetContextThread
ZwSetContextThread
RtlImageNtHeader
ZwCreateSection
ZwMapViewOfSection
ZwUnmapViewOfSection
wcslen
wcscpy
ZwClose
RtlRaiseException
ZwQueryInformationFile
RtlEqualUnicodeString
ZwQueryVirtualMemory
ZwTerminateProcess
ZwWriteVirtualMemory
RtlCreateUserThread
DbgUiGetThreadDebugObject
DbgUiConnectToDbg
DbgUiConvertStateChangeStructure
DbgUiStopDebugging
LdrGetProcedureAddress
ZwResumeThread
ZwAlertThread
ZwDebugActiveProcess
ZwReadFile
RtlInitUnicodeString
ZwCreateMailslotFile
swprintf
RtlExitUserThread
DbgUiContinue
DbgUiWaitStateChange
ZwReadVirtualMemory
DbgUiSetThreadDebugObject
memset
DisableThreadLibraryCalls
ExitProcess
LoadLibraryW
CreateProcessW
GetStartupInfoW
IsDebuggerPresent
GetCurrentProcessId
LocalFree
LocalAlloc
CreateThread
AlphaBlend
GradientFill
TransparentBlt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ