WriteBxdiunca
Lvrbcdn
Static task
static1
Behavioral task
behavioral1
Sample
77ed66589388eeca4483886aba7b57bda8f203e550097cd8c7960f90438d118b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
77ed66589388eeca4483886aba7b57bda8f203e550097cd8c7960f90438d118b.exe
Resource
win10v2004-20221111-en
Target
77ed66589388eeca4483886aba7b57bda8f203e550097cd8c7960f90438d118b
Size
78KB
MD5
52f7051f398c16c4fc361a59ca3390d7
SHA1
ef4d3f558b750a0fc3d5c5057cc8e1205500f7f1
SHA256
77ed66589388eeca4483886aba7b57bda8f203e550097cd8c7960f90438d118b
SHA512
7482dbf5b8d2ec6563b287f240b96497196fa235509045434f192305af8833ffe7ebbee372620bbc05e0f2432b92dec89aacf4b65cc93659f839ad85b04c30ba
SSDEEP
1536:NxT5MPdqaAS8BIz27bgmam6ECCkFEMBe4Z1LUeKgp6v:6Fq7S8Csgmh6xpE5g6eK4C
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetCurrentProcess
OpenFileMappingA
VirtualProtectEx
ExitProcess
CharUpperA
CheckMenuItem
EmptyClipboard
DeferWindowPos
WriteBxdiunca
Lvrbcdn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ