OdXvqyCbrkrTexgVf
LillgmwQbjwn
EnPfpeKhcrDlmg
Static task
static1
Behavioral task
behavioral1
Sample
490d1349e7c5d62a643a05f2e883e5b2827cb3a199be289ede5068b554fa2eeb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
490d1349e7c5d62a643a05f2e883e5b2827cb3a199be289ede5068b554fa2eeb.exe
Resource
win10v2004-20221111-en
Target
490d1349e7c5d62a643a05f2e883e5b2827cb3a199be289ede5068b554fa2eeb
Size
63KB
MD5
27743ebfa095aed48f26cd02e36fd028
SHA1
ad51bb014d9dbaf3a69fc6f09432ebd39e556d07
SHA256
490d1349e7c5d62a643a05f2e883e5b2827cb3a199be289ede5068b554fa2eeb
SHA512
0bec2c22f12493e36dc32f070b8b8811f1414b2155e1b6e6e0f5dddf1331ee6e23a46a5648096917eadc7018ae33edc4ecfbaa20dad3ccfd48a1cd4039943ab7
SSDEEP
1536:i2sD/I89W10ZyywTEBo3f6NCDgoc8Vh0su+9sWZE:IDQgWuyF3QCModVVZE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
LocalHandle
AssignProcessToJobObject
GetPrivateProfileStructW
CopyFileA
ExitProcess
DisableThreadLibraryCalls
InterlockedDecrement
CreateDirectoryA
GetPrivateProfileSectionW
OutputDebugStringA
GetModuleHandleA
LocalReAlloc
GetCurrentDirectoryW
CreateDirectoryW
UnlockFile
GetLastError
EnumResourceLanguagesA
LoadLibraryA
VirtualProtect
GetCurrencyFormatA
CreateDirectoryW
_osplatform
getc
fclose
_isnan
_sleep
sprintf
_getsystime
mktime
memcpy
isleadbyte
_setmbcp
??_7bad_cast@@6B@
_wasctime
_getdllprocaddr
GetDlgItem
ModifyMenuA
TrackPopupMenu
ShowWindow
DispatchMessageW
ReleaseDC
OffsetRect
GetPropW
UnregisterClassA
LoadCursorFromFileA
SendMessageW
EnumDisplayMonitors
GetSysColor
LoadStringA
IntersectRect
SetForegroundWindow
FindWindowW
LineTo
CreateCompatibleDC
SetRectRgn
SetTextColor
GetObjectW
GetBrushOrgEx
CreateDIBSection
SetMapMode
GetTextFaceW
GetTextExtentPoint32W
GetTextMetricsW
OdXvqyCbrkrTexgVf
LillgmwQbjwn
EnPfpeKhcrDlmg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ