HjXkyVddjtsm
NmvpFgbhfdsvy
NxuukbmOwxugflYd
_SoNvjvrPn
Uivpyt
LdkmtEjeTuygood
?JubriaozdjxzkbHweefa@@YGJKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
db0c99738ba10e964be8b57b17cff244f2609ba7b07d5e82ca9a5cde3851c2d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db0c99738ba10e964be8b57b17cff244f2609ba7b07d5e82ca9a5cde3851c2d9.exe
Resource
win10v2004-20220812-en
Target
db0c99738ba10e964be8b57b17cff244f2609ba7b07d5e82ca9a5cde3851c2d9
Size
83KB
MD5
6972fd465a182fc1c56ffc7f47b88761
SHA1
6f1a07c19cd955483b2a56e5bd399ec30ed27e33
SHA256
db0c99738ba10e964be8b57b17cff244f2609ba7b07d5e82ca9a5cde3851c2d9
SHA512
7a3f99a96fe1c48587613f551858d81863dbe75a1b4944e9da2e8c2e18fe790b6088434615b305c7a4cb041fab98a8145531cbebec816d372e9ef2d947bbc7d8
SSDEEP
1536:xl1gVTzOBLPme567LVxEQUz3LnG4AxhcPjfOxEQ:xPbLPme567Alz3lChMOa
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IsDBCSLeadByte
GetSystemDefaultLCID
lstrcmpiW
GetShortPathNameA
VirtualProtect
LocalAlloc
GetTempPathA
GetStringTypeExW
IsBadReadPtr
CreateWaitableTimerW
LocalFree
lstrcpynW
ReplaceTextW
PageSetupDlgW
GetSaveFileNameA
GetSaveFileNameW
GetKeyState
GetClassInfoExW
DestroyAcceleratorTable
SetTimer
PeekMessageA
GetWindowTextA
GetShellWindow
IsRectEmpty
CharNextExA
ShowWindowAsync
IsCharAlphaW
GetWindowDC
SetDIBitsToDevice
GetStockObject
GetPaletteEntries
DeleteObject
SetStretchBltMode
SaveDC
GetTextFaceW
SetROP2
GetSystemPaletteUse
HjXkyVddjtsm
NmvpFgbhfdsvy
NxuukbmOwxugflYd
_SoNvjvrPn
Uivpyt
LdkmtEjeTuygood
?JubriaozdjxzkbHweefa@@YGJKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ