_aItPFWkxuD
_3AnqNXbFbNTX
_tbRxnew@8
_4rLkz
_ppHsgt@12
KJFGygoCdvyYCQ@24
Static task
static1
Behavioral task
behavioral1
Sample
846775e739bade197b7d5e618a894c2ee41f369be3b6e3404c8044239745e613.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
846775e739bade197b7d5e618a894c2ee41f369be3b6e3404c8044239745e613.exe
Resource
win10v2004-20220812-en
Target
846775e739bade197b7d5e618a894c2ee41f369be3b6e3404c8044239745e613
Size
164KB
MD5
643e11c3b6f3b57fe14d2b26a80ac1fa
SHA1
689faaab78eb783e5a12d68354777dc43ddeb140
SHA256
846775e739bade197b7d5e618a894c2ee41f369be3b6e3404c8044239745e613
SHA512
43c61fedf4408c23a428e8e95f9d50bd4e3d5cd49e6b589bd149a0f36560abe526ccd06bb7a98e87bc54d6c2e1c90d06bb8e552b1fba147adc5a13444bbd8435
SSDEEP
3072:9bEGAXJasNbD2w1BbGprTy2M8t+e+oJevuHG54usS2H8qEeOk+cL4r3GyuJMUGZp:eIsNbJBurbN+oJevl1/OOqrVqUGZ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CharNextA
GetActiveWindow
CharToOemA
GetMenu
GetWindowDC
CharUpperBuffA
CharNextW
RegEnumValueA
Shell_NotifyIconA
SHGetDiskFreeSpaceA
SHGetDesktopFolder
SHGetFolderPathA
GetProcessHeap
LoadLibraryA
GetThreadLocale
ExitProcess
ReadFile
VirtualAlloc
GetOEMCP
RaiseException
_aItPFWkxuD
_3AnqNXbFbNTX
_tbRxnew@8
_4rLkz
_ppHsgt@12
KJFGygoCdvyYCQ@24
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ