kjaejjjijbmua
pkwfwrcizlxv
yvqkehmyns
Static task
static1
Behavioral task
behavioral1
Sample
83d69d88db78360a8443cae4d6dd263d175474d4e97fab6ad269b4d4a0bb704d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83d69d88db78360a8443cae4d6dd263d175474d4e97fab6ad269b4d4a0bb704d.exe
Resource
win10v2004-20221111-en
Target
83d69d88db78360a8443cae4d6dd263d175474d4e97fab6ad269b4d4a0bb704d
Size
127KB
MD5
d5b607f5c2323878e3b3610017fd3654
SHA1
559fa4468a848c5c61ae21abf89670f077d1dbf1
SHA256
83d69d88db78360a8443cae4d6dd263d175474d4e97fab6ad269b4d4a0bb704d
SHA512
c0f2fb7559474b3eff36bcc452f4b400f0b9cf0962cd1548a06c0e94d3bee3f40c6d6f79c4522c236f2a3ee59add320f91b3cc960b6fd47fc9a5ae94d4a04340
SSDEEP
1536:jb4ZGRE7BRwcaSTAVCMsRsjemYUW39hfuinv2QQ38wD6F2IYESq5/W2iAOjqLY:jb4hNISTfV19hfuk2QQ38we665OXjB
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
LoadLibraryA
GetProcessHeap
TerminateProcess
GetCurrentProcess
HeapAlloc
lstrcmpiA
GetProcAddress
IsBadReadPtr
LockFile
MapVirtualKeyW
TrackPopupMenuEx
IsCharLowerA
EnumObjects
BitBlt
StrokePath
CreateFontW
kjaejjjijbmua
pkwfwrcizlxv
yvqkehmyns
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ