?xaiomWvSypgnaQa@@YGFJ@Z
?cjrtpAzdbOeJp@@YGJMF@Z
?vpvhpvqiqHk@@YGPAGI@Z
?rrjsokjcVkXfaSye@@YGHN@Z
?MLhudHdRGa@@YGIHPAJ@Z
?DLLXjza@@YGGPAK@Z
?zjlnvzfsLgVcTjh@@YGGKPAG@Z
Static task
static1
Behavioral task
behavioral1
Sample
9e14e024d57774ef78a23afdcc1fad655d40314ae5668ed20bc6a614d00346fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9e14e024d57774ef78a23afdcc1fad655d40314ae5668ed20bc6a614d00346fe.exe
Resource
win10v2004-20220812-en
Target
9e14e024d57774ef78a23afdcc1fad655d40314ae5668ed20bc6a614d00346fe
Size
21KB
MD5
04bc3c0f59ebc021e88a31416bec5d41
SHA1
b545b11a9727bbead55c4d952b4c293b52b53642
SHA256
9e14e024d57774ef78a23afdcc1fad655d40314ae5668ed20bc6a614d00346fe
SHA512
d475fe67387b9acdc2630232bd11c5237fc191cc927b2ee3234c391dd8a3ee22e88c4f90032fc52df304aa708be25d8f962b606a171581c5a4122cbbfe5d91e3
SSDEEP
384:cjINkK0Da9mhBhLPUnb7VAQhYt3T+PlsaCqjUPp:c8NkK0Da9IV6VTc3fQm
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetSaveFileNameA
PrintDlgExW
GetWindowLongW
IsWindowEnabled
DialogBoxParamA
ChangeMenuW
GetNextDlgGroupItem
ExitWindowsEx
CharPrevW
CreateAcceleratorTableW
GetLastActivePopup
InflateRect
FindWindowW
SendMessageA
KillTimer
GetWindow
StartPage
StartDocW
SelectPalette
CreateFontIndirectW
PtVisible
SetBkMode
SetViewportOrgEx
GetThreadLocale
SetCurrentDirectoryW
ResumeThread
GetModuleHandleW
HeapValidate
CreateFileW
QueryDosDeviceW
RegisterWaitForSingleObject
GetProcAddress
SetEvent
LoadLibraryExW
GetStringTypeExW
GetSystemDefaultLangID
CreateEventA
CloseHandle
DragAcceptFiles
ImageList_Draw
DestroyPropertySheetPage
?xaiomWvSypgnaQa@@YGFJ@Z
?cjrtpAzdbOeJp@@YGJMF@Z
?vpvhpvqiqHk@@YGPAGI@Z
?rrjsokjcVkXfaSye@@YGHN@Z
?MLhudHdRGa@@YGIHPAJ@Z
?DLLXjza@@YGGPAK@Z
?zjlnvzfsLgVcTjh@@YGGKPAG@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ