EtzlaLoovzk
YzIgytyhZpgwknwOydrv
Static task
static1
Behavioral task
behavioral1
Sample
921a67b240ac92a2a82d930195e0200e75f2d9b58847680c6ea643e4ed5d2463.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
921a67b240ac92a2a82d930195e0200e75f2d9b58847680c6ea643e4ed5d2463.exe
Resource
win10v2004-20220812-en
Target
921a67b240ac92a2a82d930195e0200e75f2d9b58847680c6ea643e4ed5d2463
Size
76KB
MD5
a158dfcc6ef50804352e8693f1ce4b3e
SHA1
9025b3f5cbd9da666c28b022f38d11c871637546
SHA256
921a67b240ac92a2a82d930195e0200e75f2d9b58847680c6ea643e4ed5d2463
SHA512
44737e1986ad4716b29bc3a4af83a9da0b2733e0b3c0ea8720c02954fd5b91df0cc5d3d51308010f93ce947ddf951e8f6cca6b59300319b8cbb704faf53f7c42
SSDEEP
1536:bVuv2Z+cYKodmiYzyXnalVDxe68uruq8ZiooHWA9FjcaEsR6fWiuLI1:Jj+cdiYzLvqq/ca/I
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LocalHandle
CompareStringW
GetModuleHandleA
GetLastError
LocalReAlloc
LocalLock
AreFileApisANSI
GetFullPathNameA
OpenSemaphoreA
GetFullPathNameW
LoadLibraryA
GetCurrentDirectoryA
WaitForSingleObjectEx
GetStartupInfoW
CreateFileW
DuplicateHandle
GetTimeFormatA
FindResourceW
GetModuleHandleW
ExitProcess
VirtualFreeEx
InterlockedExchange
ConvertThreadToFiber
SetCurrentDirectoryA
VirtualProtect
OpenJobObjectW
VirtualAlloc
OutputDebugStringA
DisableThreadLibraryCalls
malloc
_mbsnextc
_wunlink
_mbscspn
isalnum
isprint
isspace
strlen
_fstati64
ispunct
memcpy
_msize
_wspawnve
_mbsrev
memchr
_chdrive
sprintf
_wsetlocale
wcstok
isupper
getc
getc
_fgetwchar
CheckMenuRadioItem
EnableWindow
EnableMenuItem
GetClassNameW
UpdateWindow
LookupIconIdFromDirectory
LoadStringW
GetClientRect
SetClassLongW
GetDlgItem
ModifyMenuA
UnregisterClassA
CreateWindowExW
CheckMenuItem
IsDlgButtonChecked
SetCursor
LoadStringA
CombineRgn
GetBrushOrgEx
CreateSolidBrush
GetObjectW
SetRectRgn
GetTextExtentPoint32W
CreateRectRgn
DeleteObject
SetMapMode
SetDIBits
SetPixel
GetRgnBox
glRasterPos3dv
glGetMaterialfv
glColorPointer
glPixelMapusv
glPopMatrix
glNormal3iv
glTranslated
EtzlaLoovzk
YzIgytyhZpgwknwOydrv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ