er6xgh5edrujy
klui90h
vbnvcbcvbdf
Static task
static1
Behavioral task
behavioral1
Sample
3919d088fcc782a2f3ae0d42f8642d82061fdf47957a3904221a42d7222150f7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3919d088fcc782a2f3ae0d42f8642d82061fdf47957a3904221a42d7222150f7.exe
Resource
win10v2004-20220812-en
Target
3919d088fcc782a2f3ae0d42f8642d82061fdf47957a3904221a42d7222150f7
Size
620KB
MD5
0c1ca6dad887ad9c33030f2d83337290
SHA1
4b1f948134f44f49a74bec1748dd6eacda12e728
SHA256
3919d088fcc782a2f3ae0d42f8642d82061fdf47957a3904221a42d7222150f7
SHA512
7f832e76e02f244998c129e942c73da129d46246d9b722e2dde9261a2b15ffecbc5843cc9206e22af952a739ac7569c69f91997a097b3e42641b817a3f6d7890
SSDEEP
12288:XgvNkeQEINKKcO479Zud/Gfad5sJwUHmmfn99tbRvAx2oNZ/v:eKcFxcd/GoyaKH9Pb2x26
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RtlUnwind
memcpy
sin
InterlockedCompareExchange
AddVectoredExceptionHandler
GetLastError
GetExitCodeProcess
CreateWaitableTimerW
GetCurrentThread
RemoveVectoredExceptionHandler
lstrcmpiA
GetStdHandle
GlobalFree
FindResourceA
MultiByteToWideChar
GetDiskFreeSpaceA
GetFileSize
SetStdHandle
GetWindowsDirectoryA
GetEnvironmentStrings
CreateFileMappingA
GetStringTypeW
HeapAlloc
MapViewOfFile
MoveFileExA
IsBadCodePtr
SizeofResource
UnhandledExceptionFilter
GlobalLock
WritePrivateProfileStringA
FindFirstFileA
SetFilePointer
TerminateProcess
IsBadReadPtr
GlobalAlloc
lstrlenA
GetModuleFileNameA
GetPrivateProfileSectionA
CompareStringA
CreateFileA
LocalAlloc
UnmapViewOfFile
GetOEMCP
GetEnvironmentStringsW
LockResource
LoadLibraryA
SetUnhandledExceptionFilter
LCMapStringW
GetModuleHandleA
GetPrivateProfileStringA
WideCharToMultiByte
ExitProcess
LCMapStringA
GetProcessHeap
GetShortPathNameA
GetFileType
lstrcatA
GetStringTypeA
FindClose
CloseHandle
GetProcAddress
SetHandleCount
HeapFree
lstrcpyA
GlobalUnlock
LocalFree
FreeEnvironmentStringsW
LoadResource
CreateDirectoryA
SetEnvironmentVariableA
GetTimeZoneInformation
GetLocaleInfoW
VirtualQuery
GetSystemInfo
VirtualProtect
CompareStringW
GetTempPathA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCommandLineA
GetVersionExA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringA
WriteFile
FreeEnvironmentStringsA
DeleteCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
GetCPInfo
GetACP
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryExA
InitializeCriticalSection
Sleep
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetCurrentProcess
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHGetMalloc
RegQueryValueExA
RegOpenKeyExA
InsertMenuW
er6xgh5edrujy
klui90h
vbnvcbcvbdf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ