_KL8XCzUyNBhvmV@8
SpcwDd@20
Static task
static1
Behavioral task
behavioral1
Sample
dbb034be646807129236c1c757041b1a4d32c7df9eff0ff0d0ab080673c19403.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dbb034be646807129236c1c757041b1a4d32c7df9eff0ff0d0ab080673c19403.exe
Resource
win10v2004-20220812-en
Target
dbb034be646807129236c1c757041b1a4d32c7df9eff0ff0d0ab080673c19403
Size
144KB
MD5
671aecb89c310d2c91243242403f09ea
SHA1
dbeee44163c6a0d359867d5b7ecfad1d9169c1b1
SHA256
dbb034be646807129236c1c757041b1a4d32c7df9eff0ff0d0ab080673c19403
SHA512
cff1864fc27eb9b67806e199c7f00e103478e1d7486776986f4e36338edbb863fdfb1eabbf9a1196459fe0a71be3e23ba37e4f2710fa5c672394b3c8dc08613f
SSDEEP
3072:8sbqwbL5PQJ1IB+o0TfLkLreyB0wJDG0:RmwbLyn3HgLU
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualFree
GetStartupInfoA
VirtualAllocEx
GetEnvironmentStrings
IsBadHugeReadPtr
HeapDestroy
GetFileAttributesA
lstrcatA
LoadLibraryA
FindFirstFileA
SetThreadLocale
GetCurrentProcess
GetProcessHeap
GlobalAddAtomA
ExitProcess
GetThreadLocale
GlobalAlloc
GetStringTypeA
MoveFileA
GetLocalTime
WriteFile
GetFileSize
SHGetDiskFreeSpaceA
SHGetFolderPathA
Shell_NotifyIconA
SHFileOperationA
Shell_NotifyIconW
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
ChooseColorA
SendMessageW
IsCharLowerA
IsWindowEnabled
GetMenu
SetActiveWindow
SetCapture
CharNextA
LoadBitmapA
SendMessageA
_KL8XCzUyNBhvmV@8
SpcwDd@20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ