AddBrxiucyg
IsPpjccppi
Static task
static1
Behavioral task
behavioral1
Sample
c6cf74057f691a23579daab914fd4cb8a0556e8b2167d5c5537c51618821a0bb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c6cf74057f691a23579daab914fd4cb8a0556e8b2167d5c5537c51618821a0bb.exe
Resource
win10v2004-20220901-en
Target
c6cf74057f691a23579daab914fd4cb8a0556e8b2167d5c5537c51618821a0bb
Size
398KB
MD5
a3db392d80d4adc29f9349fe3e7014c8
SHA1
2d92c01965d415f29e85040952cea722e16c56ca
SHA256
c6cf74057f691a23579daab914fd4cb8a0556e8b2167d5c5537c51618821a0bb
SHA512
9c5304efd88874d98ee70da88d9f2275652c3f35bd756e3f6975c7477724ff5d230c24578a19569c4d1f5fc70e215b4db6de1ce00d01a8c3e39edfa4fad444d4
SSDEEP
12288:Afm6HeXpqWULHyHDPpiOJOPzTlzKa/pq:AuMe5JUjyjPpiOiF0
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetProcessVersion
ExitProcess
GetMessageW
GetCursor
AddBrxiucyg
IsPpjccppi
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ