PnxyH15PMq
AXKNYxPA9N5eOk@24
MIaNPH7NJPqsZ@16
j4UjcL3Z
Static task
static1
Behavioral task
behavioral1
Sample
4382f8491a0e3283b8a03998eca9e26c887883e03802aaa477832d03a70b070d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4382f8491a0e3283b8a03998eca9e26c887883e03802aaa477832d03a70b070d.exe
Resource
win10v2004-20220812-en
Target
4382f8491a0e3283b8a03998eca9e26c887883e03802aaa477832d03a70b070d
Size
123KB
MD5
73f6e0270a84509af30947a607fff3af
SHA1
b068b6697e91b251cca6189dba117ccc09d40995
SHA256
4382f8491a0e3283b8a03998eca9e26c887883e03802aaa477832d03a70b070d
SHA512
f0a2bfa12f9c3721a31bed54d53d04b4dca7f1b6b8ff13ef391fa1c8f93d775c024cf517efe3d28779ffddeb28d93fb0bdc80173a55c515c7db7aa423c8ca2f3
SSDEEP
3072:hMO7wgBNMXiaZNnqoCosIa7e+rpBJghrcza:/DkVUKsIlExWrcG
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OpenIcon
DrawAnimatedRects
GetActiveWindow
GetWindowDC
IsCharLowerA
CharUpperA
IsCharUpperA
CreatePopupMenu
GetMenu
LoadLibraryA
GetProcAddress
GetCurrentThreadId
VirtualAlloc
ExitProcess
GetModuleHandleA
VirtualAllocEx
GetCommandLineA
GetModuleFileNameA
PnxyH15PMq
AXKNYxPA9N5eOk@24
MIaNPH7NJPqsZ@16
j4UjcL3Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ