CFCJO94C
DDGPIUCK
KGQZ0ND8
UKEG3H6Z
Z8WMDU8P
Static task
static1
Behavioral task
behavioral1
Sample
0c0a0b85dcf16b5d271f94a6c0df20165cc8a0cc3ffb6fd6a5870d3d0b55e4ba.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0c0a0b85dcf16b5d271f94a6c0df20165cc8a0cc3ffb6fd6a5870d3d0b55e4ba.exe
Resource
win10v2004-20220812-en
Target
0c0a0b85dcf16b5d271f94a6c0df20165cc8a0cc3ffb6fd6a5870d3d0b55e4ba
Size
820KB
MD5
714e5d9ea5f5b7de6809de1fefee6050
SHA1
86219b9eb6a5e218e5c981580a04094ba76071ec
SHA256
0c0a0b85dcf16b5d271f94a6c0df20165cc8a0cc3ffb6fd6a5870d3d0b55e4ba
SHA512
c23242177c991d5481346bfac8d2cd88f1071f7e3668ae99dc3ccc5ec2c5ed3b6e268c6e008d61d500c8afcb9e2d26416c70590c037c0aaffa40ff165a556538
SSDEEP
12288:UUd+R0xFYgonWqzxTYY5a2NmOZkQA/zmZx9ypmDCWAzpFeGSsvoUsU:UUAwFaWqSohDSmZx9vCWATeH8oU/
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MoveFileExA
HeapFree
WriteFile
DeleteFileA
Sleep
ReadFile
HeapAlloc
GetProcessHeap
GetFileSize
GetTickCount
lstrlenA
ExitProcess
lstrcatA
lstrcpyA
CopyFileA
GetTempPathA
GetModuleFileNameA
GetCommandLineA
GetCurrentThreadId
CloseHandle
CreateFileA
CreateProcessA
RtlUnwind
wsprintfA
GetMessageA
PostThreadMessageA
GetInputState
StrStrIA
StrRChrA
CFCJO94C
DDGPIUCK
KGQZ0ND8
UKEG3H6Z
Z8WMDU8P
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ