_Expr3iHr8wkdC7@8
4o_c9l1D0T
_3wnTHWcqjzd85t
_Mdr3VH_dy0T
_qtaBocvavX@16
Static task
static1
Behavioral task
behavioral1
Sample
c6c63b34d8046e0e25630d958538faf098d8cb8251ccb403085da6bf0d81caee.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6c63b34d8046e0e25630d958538faf098d8cb8251ccb403085da6bf0d81caee.dll
Resource
win10v2004-20220901-en
Target
c6c63b34d8046e0e25630d958538faf098d8cb8251ccb403085da6bf0d81caee
Size
179KB
MD5
661c326f0c5e388d03bc356dbfa86ebf
SHA1
1626b5e062bb73ddbe7b49f2ead89b53d33c5686
SHA256
c6c63b34d8046e0e25630d958538faf098d8cb8251ccb403085da6bf0d81caee
SHA512
7241ea2ab829fc33a5bf77be2eeb4b00dc09b7728803b8ec4beb4cdffd23604acc302112350569a54ef9f226f65f68a27b88dc95367e4244eaa45508edb36f74
SSDEEP
3072:C+Erpvrgi25CthBbiBnsi5Y2Gx/oP01QdsUlb6uOB0R/a6RIrWY:C+OvrTwChiqozJb6bB0R/nRw
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VerFindFileA
GetFileVersionInfoSizeA
ImageList_Remove
GetCommandLineW
GetCurrentProcessId
IsBadHugeReadPtr
ExitProcess
GetStartupInfoA
GlobalAlloc
GetModuleHandleA
FindResourceA
InitializeCriticalSection
GetACP
LockResource
GetStdHandle
lstrlenA
GetLastError
LocalAlloc
SetEndOfFile
VirtualAlloc
GetProcAddress
GetCPInfo
SetEvent
LoadResource
CreateMenu
SetWindowPos
GetMenuItemCount
GetMenu
SetWindowPlacement
GetCursor
SetWindowLongA
IsCharUpperA
CreateBrushIndirect
CreateBitmap
CopyEnhMetaFileA
_Expr3iHr8wkdC7@8
4o_c9l1D0T
_3wnTHWcqjzd85t
_Mdr3VH_dy0T
_qtaBocvavX@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ