Cmaoapkbd
Uvtnoeisk
Static task
static1
Behavioral task
behavioral1
Sample
e7d44b911f5c8d2d72d1014edeeda293cb2f16cdf2332225dba4d25b21bbde32.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e7d44b911f5c8d2d72d1014edeeda293cb2f16cdf2332225dba4d25b21bbde32.exe
Resource
win10v2004-20220812-en
Target
e7d44b911f5c8d2d72d1014edeeda293cb2f16cdf2332225dba4d25b21bbde32
Size
64KB
MD5
71cbddefd3be2a0565c9c8424ca36c10
SHA1
c68f91f0b8d0d3504e82157fc05d0fa2e0e8e07a
SHA256
e7d44b911f5c8d2d72d1014edeeda293cb2f16cdf2332225dba4d25b21bbde32
SHA512
52c937f4543bc101a020d5f608ea05c48d1d233f86c90fe957e86dcf2a293a108c36e17e59da365ba3fbccf5f1449f347561d4be16329c04f86af1a60bd1b16c
SSDEEP
1536:HTrHXebs0VdG/4o0L0/e+7+iIcOemGSUGlH8:XHys0VdTPlee3lH8
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GlobalAlloc
GetThreadLocale
VirtualAlloc
GlobalUnlock
GlobalFree
MoveFileExW
GlobalLock
GetDriveTypeA
lineSetCallData
SetFocus
GetWindow
DragObject
Cmaoapkbd
Uvtnoeisk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE