?closeSec@@YGKPAK@Z
AmisrompcepeDreePinkWeenyuchpotos
Static task
static1
Behavioral task
behavioral1
Sample
486144065044f887082b545323113d262bb21ceca0be7a5dde4d348f6a750e02.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
486144065044f887082b545323113d262bb21ceca0be7a5dde4d348f6a750e02.exe
Resource
win10v2004-20220812-en
Target
486144065044f887082b545323113d262bb21ceca0be7a5dde4d348f6a750e02
Size
197KB
MD5
140f49db606d8fd8def565af95f3c377
SHA1
e5cfa96e7290bfeb932bdb9d8c51ee4f1eb64c4a
SHA256
486144065044f887082b545323113d262bb21ceca0be7a5dde4d348f6a750e02
SHA512
c73a78ad7cdd72d85079c921bf84c5650b8faa6d183c4ce6e857bda801c8127fded91948899edbf15b16a9284b6ff1d2b1e555ac0f480b6a646ad8876e430493
SSDEEP
3072:4LEQocPlt4e1+vp5c2sk+znRfMAXPY7fRL9BbS3Vs2w529HUpHOk:GEQX9tN1+rokwRfVXPWZL943VxwxZl
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathIsRootW
StrSpnW
StrStrW
GetLogicalDrives
GetSystemDefaultLangID
lstrlenA
GetConsoleAliasExesA
SetLocalTime
GetDriveTypeW
GetSystemDefaultUILanguage
GetConsoleAliasExesLengthA
FindResourceW
GetCurrentProcess
GetUserDefaultLCID
LocalFileTimeToFileTime
CancelWaitableTimer
GetCurrentThread
CreateProcessA
TerminateProcess
lstrlenW
GetStartupInfoW
CreateDirectoryA
GetOEMCP
GetCurrentThreadId
CloseHandle
GetWindowsDirectoryW
SetWindowTextW
GetClipboardOwner
BroadcastSystemMessageA
ClipCursor
GetActiveWindow
SendMessageTimeoutW
GetDesktopWindow
GetKeyboardLayout
GetMenu
WaitMessage
GetDoubleClickTime
wsprintfW
GetClassLongW
SetParent
DrawIcon
LoadCursorW
SetForegroundWindow
GetTopWindow
GetMessageExtraInfo
IsChild
IsCharAlphaA
wvsprintfW
RegisterWindowMessageW
HideCaret
DestroyWindow
GetClipboardFormatNameW
ArrangeIconicWindows
GetKeyboardLayoutNameA
DestroyMenu
CreatePatternBrush
?closeSec@@YGKPAK@Z
AmisrompcepeDreePinkWeenyuchpotos
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ