?oJvXeiKyQfFudsveMcp@@YGPAXJPAH@Z
?PzurdTxawk@@YGXH@Z
?slfWiXqXjawjUchoDx@@YGPAXPAE@Z
?oyaTdYysqeeOhtxinMNyq@@YGPAIMI@Z
?HoLGypeiaNotYcmVR@@YGXIPAM@Z
?xVkSiso@@YGPA_NF@Z
?aXobcvbgjoMifw@@YGPAEH@Z
Static task
static1
Behavioral task
behavioral1
Sample
c5ad4c089b1b75beb3e64c0a17237580d576950fb65e17aa6f3ec15765b0f642.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c5ad4c089b1b75beb3e64c0a17237580d576950fb65e17aa6f3ec15765b0f642.exe
Resource
win10v2004-20220812-en
Target
c5ad4c089b1b75beb3e64c0a17237580d576950fb65e17aa6f3ec15765b0f642
Size
48KB
MD5
005c40b882d18bccccba31fe8e31588b
SHA1
923e9226aee7b2c81220bc7faafe70251821acac
SHA256
c5ad4c089b1b75beb3e64c0a17237580d576950fb65e17aa6f3ec15765b0f642
SHA512
c5689916a6f27d49f68b7c7f58d3287675672997ed8861d99804e321420f2f213d3bd9398ac165f6f63efab7806db6c5c729dbe6e670b18a60eb76a26678ab37
SSDEEP
768:pYawuSDlQMpQ5TJOw0nG1e3LCh08QsXcuZdsUSWCG5/49Q9Xna:p3wuSy0p7l8QsJSWCGR4Ca
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetNamedPipeHandleState
IsBadReadPtr
LCMapStringA
GlobalMemoryStatus
GetWindowsDirectoryA
GetTickCount
CloseHandle
ReleaseSemaphore
CreateSemaphoreW
GetAtomNameW
DeleteFileA
FlushFileBuffers
GetStartupInfoW
GetFileTitleW
PrintDlgExW
PathFindExtensionA
GetDialogBaseUnits
EnumThreadWindows
SetMenu
IsCharLowerW
MapVirtualKeyW
GetWindowRect
GetIconInfo
GetLastInputInfo
ScreenToClient
PtInRect
SetWindowTextA
CharUpperBuffW
OemToCharBuffA
SetMapMode
PathToRegion
EnumFontsW
CreateFontW
GetTextMetricsW
CreateRectRgnIndirect
?oJvXeiKyQfFudsveMcp@@YGPAXJPAH@Z
?PzurdTxawk@@YGXH@Z
?slfWiXqXjawjUchoDx@@YGPAXPAE@Z
?oyaTdYysqeeOhtxinMNyq@@YGPAIMI@Z
?HoLGypeiaNotYcmVR@@YGXIPAM@Z
?xVkSiso@@YGPA_NF@Z
?aXobcvbgjoMifw@@YGPAEH@Z
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ