?NaCkpuvw@@YGMEPAE@Z
?YjzqoTmxdntAJEorrr@@YGNPAKJ@Z
?UydmjajyjkfwBuigfWvdi@@YGFGM@Z
?EmulopjSnipyrlIsl@@YGMPAI@Z
?_GpiyLchd@@YGPAEJG@Z
Static task
static1
Behavioral task
behavioral1
Sample
b6320a0401b6997e4b8aa899be4715f8c8fb3224e29a8af8920c9bc392b8d016.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b6320a0401b6997e4b8aa899be4715f8c8fb3224e29a8af8920c9bc392b8d016.exe
Resource
win10v2004-20220812-en
Target
b6320a0401b6997e4b8aa899be4715f8c8fb3224e29a8af8920c9bc392b8d016
Size
98KB
MD5
1b2aa004f048ff9eb3e72d8b8999d4b0
SHA1
df9aa7fcf4ea9346d63be3c668c71550dede52e5
SHA256
b6320a0401b6997e4b8aa899be4715f8c8fb3224e29a8af8920c9bc392b8d016
SHA512
adee78546ef389b95b54e881a8f158bd76fa4a65ac92387544a1f8f180c97c0612ffa24ef8f2a4161731c0b2fe1914821643806264645434d4d76b23c59d484e
SSDEEP
1536:6mPgjTsT8hIc1+P8h+MsybXWjSoqEX3NiV8UfTfsWYWlyQ/0vYew1TAa9:hYk7s+asybXWr3C8aLYWlSQew1E8
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindTextW
GetFileTitleW
GetOpenFileNameW
memset
HideCaret
AppendMenuA
LoadMenuW
GetUserObjectInformationW
SetMenuItemInfoW
SetScrollInfo
CharUpperA
PostMessageA
IsCharAlphaA
TranslateAcceleratorA
InSendMessage
SetRectEmpty
CreateAcceleratorTableW
StrCmpNIA
GetLogicalDriveStringsA
lstrcmpiA
ClearCommError
GetWindowsDirectoryA
LockResource
LoadLibraryExW
QueryPerformanceCounter
SetHandleCount
GetNumberFormatA
CreateDirectoryW
ClearCommBreak
GetBinaryTypeW
SetCommMask
GetStartupInfoW
SetDIBColorTable
SetViewportExtEx
CreateRectRgn
Escape
GetTextExtentPoint32A
SetBitmapBits
TranslateCharsetInfo
CreatePenIndirect
?NaCkpuvw@@YGMEPAE@Z
?YjzqoTmxdntAJEorrr@@YGNPAKJ@Z
?UydmjajyjkfwBuigfWvdi@@YGFGM@Z
?EmulopjSnipyrlIsl@@YGMPAI@Z
?_GpiyLchd@@YGPAEJG@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ