?GetJHkjghfdkghfdkhg@@YGPAXXZ
?GetJfkdgklfdjglkd@@YGPAXXZ
?GetKFLksdokgdghdl@@YGPAXXZ
?GetKWKJFxgkfdlkg@@YGPAXXZ
?GetKfldksglkdfg@@YGPAXXZ
?GetYufdslgjdl@@YGPAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
42a1693035510b346095e73e2c0ddc78a0f08ed3da954d07dad8240e862a8ee8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
42a1693035510b346095e73e2c0ddc78a0f08ed3da954d07dad8240e862a8ee8.exe
Resource
win10v2004-20220812-en
Target
42a1693035510b346095e73e2c0ddc78a0f08ed3da954d07dad8240e862a8ee8
Size
98KB
MD5
0fbdc034df5421fb9a3b59e26eb52430
SHA1
761a5bb58e500a57174f382ae9d51f0260030fb6
SHA256
42a1693035510b346095e73e2c0ddc78a0f08ed3da954d07dad8240e862a8ee8
SHA512
6eb9add10bbc8248a387185221708702b1bf2276209fcf310549bf739b186fa10086b1e8d0ae8910abbdfb54207485b8084a85d3b914d702326da0a202ba6f2e
SSDEEP
3072:BKO2Vl37m5ql6aQN6LUc6f8TrQa+Jww8YnDov/:4PzqbaM6LB6MQWSo
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
malloc
memset
memcpy
free
rand
ord17
GetProcessId
VirtualQuery
GetModuleHandleA
SetEvent
CreateEventA
CloseHandle
WaitForSingleObject
CreateMutexA
ExitProcess
LoadStringA
ShowWindow
GetWindowRect
SetTimer
SetScrollRange
GetScrollRange
InvalidateRect
MoveWindow
SetWindowPos
SendMessageA
PostMessageA
CreateWindowExA
DestroyWindow
FindWindowA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
SetWindowTextA
CombineRgn
CreateRectRgn
?GetJHkjghfdkghfdkhg@@YGPAXXZ
?GetJfkdgklfdjglkd@@YGPAXXZ
?GetKFLksdokgdghdl@@YGPAXXZ
?GetKWKJFxgkfdlkg@@YGPAXXZ
?GetKfldksglkdfg@@YGPAXXZ
?GetYufdslgjdl@@YGPAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ