Asiajgqsewr
Bcbuqncx
EndFutgaatx
InitCuoetyg
InitNuhxkyrc
Pmkjxgpee
WriteJvmcwrsm
CreateOxeqcwesxtr
Bbmwwimcei
Hufjrjvccpp
Static task
static1
Behavioral task
behavioral1
Sample
cedc66dfec6c9bedc8d3aaa0cf5106a13998a9441cdc73ccb631353c00a4d256.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cedc66dfec6c9bedc8d3aaa0cf5106a13998a9441cdc73ccb631353c00a4d256.exe
Resource
win10v2004-20220812-en
Target
cedc66dfec6c9bedc8d3aaa0cf5106a13998a9441cdc73ccb631353c00a4d256
Size
170KB
MD5
0ab7becec23e5eca4f5e8ee1bcee03f6
SHA1
5b5fc90da91dd0e0dc2a1f7a29a150a823705afb
SHA256
cedc66dfec6c9bedc8d3aaa0cf5106a13998a9441cdc73ccb631353c00a4d256
SHA512
7e99a13435621744688df329ec567905c2f0e4483cb56ab8685f3e2295ad536a50832004dd1ed20123877b0ed14fd2f5717da96c520b3c9d0d21324835be64ad
SSDEEP
3072:B44Tn0mpZLubXKSjc07Sg3cbljiLL9zLhA6Mk3zXrjdLVBC/Kw:B460eqbvA07Sg3kjorDXrjlVBCy
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
HeapUnlock
GetThreadPriority
GetFullPathNameA
HeapAlloc
HeapSize
GetProcessHeap
GlobalUnfix
GetProfileSectionA
VirtualAlloc
HeapLock
HeapFree
HidD_GetInputReport
HidD_GetIndexedString
Asiajgqsewr
Bcbuqncx
EndFutgaatx
InitCuoetyg
InitNuhxkyrc
Pmkjxgpee
WriteJvmcwrsm
CreateOxeqcwesxtr
Bbmwwimcei
Hufjrjvccpp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ