AOWUXWHMS
EHWQNQRQP
MXUJJLOOV
NCBXCOKSF
Static task
static1
Behavioral task
behavioral1
Sample
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Resource
win10v2004-20221111-en
Target
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef
Size
426KB
MD5
07f06f07be8fed6d6d3549194b3e5686
SHA1
3af21ce20da77519adb2e75e4115805b58b906d0
SHA256
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef
SHA512
d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb
SSDEEP
12288:82pPo5DWEbs+LjK0VneEFhPlTSzZV4hQt:8225iEbsGeEhrKt
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
GetTickCount
HeapFree
MoveFileExA
WriteFile
DeleteFileA
Sleep
ReadFile
HeapAlloc
GetProcessHeap
CreateProcessA
CreateFileA
lstrlenA
ExitProcess
lstrcatA
lstrcpyA
CopyFileA
GetTempPathA
GetModuleFileNameA
GetCommandLineA
GetFileSize
RtlUnwind
wsprintfA
StrRChrA
StrStrIA
AOWUXWHMS
EHWQNQRQP
MXUJJLOOV
NCBXCOKSF
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ