KmmbTobyhhTytqsGf
BxsUoytkpPsl
TanudMqnek
Static task
static1
Behavioral task
behavioral1
Sample
f749ec4cf1a990cdeb6fb85a63da913fb9e28b8a808aa4fda61938859cbc6352.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f749ec4cf1a990cdeb6fb85a63da913fb9e28b8a808aa4fda61938859cbc6352.exe
Resource
win10v2004-20220812-en
Target
f749ec4cf1a990cdeb6fb85a63da913fb9e28b8a808aa4fda61938859cbc6352
Size
120KB
MD5
0cc1d047e10b38ffbe00f4f912a3b6bc
SHA1
beb972f0df5fb15537d1e92a661d8fa51421a9ef
SHA256
f749ec4cf1a990cdeb6fb85a63da913fb9e28b8a808aa4fda61938859cbc6352
SHA512
172b3a06b8768016dd4f789cd379b7ba626f085150258416dd5c2d087ac17d13e970878c00d6fe5eb2217c4ddcf80d04a4b77e527501c93f9d3908c1f77412e4
SSDEEP
3072:MuB6khjk2bKcYlsC4HmrYAXAeLxW1R1bsrBXi:M3klbbY2mdA0s1rsrBX
IMAGE_DLLCHARACTERISTICS_WDM_DRIVER
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OutputDebugStringA
_lclose
VirtualFree
GetProcAddress
LoadLibraryW
CallNamedPipeA
CreateHardLinkA
GetLastError
HeapAlloc
ExitThread
lstrlenA
VirtualProtect
WriteConsoleW
GetStringTypeW
CallNamedPipeW
FreeLibrary
VirtualAlloc
GetModuleHandleA
GetWindowsDirectoryA
FindFirstFileW
GetCurrentProcess
_cexit
isdigit
free
isalpha
strncpy
wcscat
memcpy
_adjust_fdiv
_snwprintf
_iob
__CxxFrameHandler
wcschr
_purecall
_exit
wcslen
__dllonexit
__winitenv
wcscpy
malloc
_c_exit
_ftol
__p__commode
__initenv
swprintf
_wcmdln
_vsnprintf
_wtol
_controlfp
wcscmp
swscanf
__p__fmode
_except_handler3
RegisterClassA
ReleaseDC
GetMenuItemCount
GetCursorPos
SendMessageW
GetParent
DestroyWindow
BeginPaint
GetProcessWindowStation
LoadCursorA
LoadImageW
MapWindowPoints
CheckDlgButton
SetScrollPos
DispatchMessageW
wsprintfW
LoadCursorW
ClientToScreen
ReleaseCapture
SetCapture
LoadMenuW
DialogBoxParamA
CopyRect
ScreenToClient
SendMessageA
IsWindow
UnregisterClassW
SHGetFolderPathW
SHGetFileInfoW
SHGetPathFromIDListW
ShellExecuteW
wglShareLists
glColor4i
glTexCoord2d
GlmfBeginGlsBlock
glColor4f
glColor3ui
glColor4d
glStencilMask
glFogfv
glTexCoord2dv
KmmbTobyhhTytqsGf
BxsUoytkpPsl
TanudMqnek
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ