?VirtualMemory@@YGKPAK@Z
TiltMornyogidifsel
Static task
static1
Behavioral task
behavioral1
Sample
a5cf5b8597ec3bbaf885542a47ec8cb74d14f292d1bc928a3db9e4db95e3f5a7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a5cf5b8597ec3bbaf885542a47ec8cb74d14f292d1bc928a3db9e4db95e3f5a7.exe
Resource
win10v2004-20220812-en
Target
a5cf5b8597ec3bbaf885542a47ec8cb74d14f292d1bc928a3db9e4db95e3f5a7
Size
225KB
MD5
8d83b8f6644e4c18443cd1f37c9857c9
SHA1
24b14afef4fa20369385a14d97cbccf3218c86c3
SHA256
a5cf5b8597ec3bbaf885542a47ec8cb74d14f292d1bc928a3db9e4db95e3f5a7
SHA512
74b9bc6dec2f0a26ed820903c1194e1ff151b03b1af3c11a2cca115258149b0e7e2016e2f830c811fa1f64c468e90c572f1d676ff5dfffb61aa6039c84d4b1d9
SSDEEP
6144:G3PK+XC2dE1+oF6TpJnG98F/Qs74k0yi06V3EG:GSOEjKovLy96j
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrRChrIA
PathIsUNCA
StrToIntA
StrRStrIW
PathIsRootA
PathGetArgsW
PathIsNetworkPathA
PathIsNetworkPathW
GetNumberFormatW
OutputDebugStringA
GetVersion
GetSystemTime
SetConsoleCtrlHandler
SetConsoleMode
GetConsoleAliasExesLengthW
GetTickCount
GetModuleHandleW
GetSystemDefaultLCID
GetEnvironmentStringsW
GetSystemDefaultLangID
OpenFile
FindResourceA
GlobalDeleteAtom
GetClipboardFormatNameW
ShowWindowAsync
GetMenuItemID
IsChild
KillTimer
GetSubMenu
CloseWindowStation
LoadBitmapA
EnumWindowStationsA
GetClipboardFormatNameA
CreateMenu
DdeQueryStringW
GetAsyncKeyState
GetClipboardData
LoadAcceleratorsA
DefDlgProcA
SetWindowTextA
ValidateRgn
IsCharUpperW
Polyline
GetDIBColorTable
ScaleViewportExtEx
EndPath
OffsetRgn
CombineRgn
SetRectRgn
DeleteObject
SetBkMode
CreateDCW
EnumMetaFile
CreateHatchBrush
SetTextColor
TranslateCharsetInfo
MoveToEx
CreateEllipticRgnIndirect
?VirtualMemory@@YGKPAK@Z
TiltMornyogidifsel
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ