GetOjncxjpceta
Eqlanltea
SetNsiqbsnfl
Static task
static1
Behavioral task
behavioral1
Sample
ab3130ecc204ab92bd2d8c6574eeeebb9f31018fd9bbf95cc3cf474d889ae4f8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab3130ecc204ab92bd2d8c6574eeeebb9f31018fd9bbf95cc3cf474d889ae4f8.exe
Resource
win10v2004-20221111-en
Target
ab3130ecc204ab92bd2d8c6574eeeebb9f31018fd9bbf95cc3cf474d889ae4f8
Size
136KB
MD5
4573a5b628405de26bde89417d1759fc
SHA1
02088026db09c26bcc65eb15677cc96a5824077b
SHA256
ab3130ecc204ab92bd2d8c6574eeeebb9f31018fd9bbf95cc3cf474d889ae4f8
SHA512
f3215e28ac3dc215986d67d718d938da421fd15ebdfbe3ed9ddd3e14763cca16e227d8cdc3aab6e31c775e622a7eb6c73943d55bcc6e7d1a4b8e4d9cca693964
SSDEEP
3072:7uD/VgGm0RPrx/pNvCYIqllGwwG4BRs6bAPTDxoMzTW7CePi2uFvhq8:7uD9gYTHRCYFl4G4BJbA/uGkCeu
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFileScatter
OpenFileMappingA
GetTempPathA
WriteConsoleA
WaitForMultipleObjectsEx
ReadConsoleA
GetConsoleWindow
RequestWakeupLatency
ExitThread
GetCommProperties
FormatMessageA
EnumResourceTypesA
lstrcpyA
GetDiskFreeSpaceExA
OpenWaitableTimerA
DeleteTimerQueueTimer
lstrcatA
BuildCommDCBA
SetLocalPrimaryComputerNameA
GetPrivateProfileStructA
SetConsoleNumberOfCommandsA
FindNextFileA
VirtualQuery
GetLogicalDrives
DeleteTimerQueue
GetSystemTimeAsFileTime
FindAtomA
RemoveDirectoryA
GetCurrentThread
GetModuleHandleA
GetMailslotInfo
LZCopy
MapViewOfFileEx
VirtualAllocEx
GlobalGetAtomNameA
GetStringTypeExW
GetCurrencyFormatA
VirtualLock
GetSystemDirectoryA
IsWow64Process
GetDevicePowerState
lstrcmpA
FlushViewOfFile
GetThreadSelectorEntry
WriteConsoleA
GetProcessTimes
GetWindowsDirectoryA
ReadConsoleOutputA
GetConsoleMode
EndUpdateResourceA
GetNamedPipeHandleStateA
lstrcpynA
lstrcpyn
GetNativeSystemInfo
GlobalFindAtomA
IsBadHugeReadPtr
RegisterWaitForSingleObjectEx
SignalObjectAndWait
GetOverlappedResult
TransactNamedPipe
HeapUnlock
IsSystemResumeAutomatic
GetFileSize
VirtualUnlock
FlushInstructionCache
GetPrivateProfileStringA
SetConsoleMode
GetOverlappedResult
GetThreadIOPendingFlag
WriteConsoleInputA
ReadConsoleOutputCharacterA
GetFileAttributesExA
GetEnvironmentStringsA
WriteConsoleOutputCharacterA
EnumTimeFormatsA
GetStringTypeExA
GetProcessHeaps
lstrcpynA
GetDriveTypeA
IsValidLanguageGroup
EnumSystemLocalesA
GetLocaleInfoA
CreatePipe
AddAtomA
Heap32First
CloseHandle
GetTempPathA
GetConsoleMode
IsValidCodePage
PrepareTape
GetSystemTimes
timeGetSystemTime
LoadImageA
GetWindowModuleFileNameA
IsDialogMessageA
CharNextExA
SetWindowsHookExW
DefRawInputProc
CharLowerBuffW
PostThreadMessageA
GetMenuDefaultItem
DrawTextExW
DispatchMessageA
GetMenuStringA
GetUpdateRect
EnumClipboardFormats
GrayStringA
CharPrevA
CharLowerBuffA
SendIMEMessageExA
EnumDisplayMonitors
SetWindowPos
CreateWindowStationW
GetCursorPos
GetMessageTime
LoadImageA
CheckRadioButton
LockSetForegroundWindow
RegisterClipboardFormatA
LockWorkStation
GetClassInfoA
SetClassLongA
EnterReaderModeHelper
GetUpdateRect
GetWindowTextA
SetPropA
SetClassWord
CallMsgFilterA
SendNotifyMessageA
GetWindowLongA
CreateIconFromResource
LoadMenuA
LoadIconA
OemKeyScan
SubtractRect
DisableProcessWindowsGhosting
FindWindowExW
TabbedTextOutA
MessageBoxTimeoutW
PeekMessageA
GetClassNameA
CliImmSetHotKey
UnhookWindowsHookEx
SetWindowsHookExA
CharNextExA
EnumDisplaySettingsA
GetScrollRange
TrackPopupMenu
IsZoomed
CreateDesktopA
CheckRadioButton
GetPropA
InsertMenuItemW
PeekMessageA
OemToCharA
EnumDisplaySettingsExA
DisableProcessWindowsGhosting
SetWindowStationUser
GetWindowTextA
AlignRects
DeferWindowPos
GetWindowInfo
ReasonCodeNeedsComment
SetForegroundWindow
GetDlgItem
RegisterLogonProcess
GetClassInfoA
GetWindowRgn
CharToOemA
RemovePropA
LoadLocalFonts
ChangeClipboardChain
GetClipboardData
GetTabbedTextExtentA
RegisterTasklist
MenuWindowProcA
IsWindowEnabled
MenuItemFromPoint
SendIMEMessageExA
SetWindowStationUser
SetWindowPlacement
IsRectEmpty
GetOjncxjpceta
Eqlanltea
SetNsiqbsnfl
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ