InitXjmhoxfpfl
Yiqhfhy
ReadNrexwrm
AddTquencitld
IsUbovdywg
Bvcftqrs
OpenBqwjgqp
BeginYwwklkpubnt
EndOxbkcxqlko
Gqspgmxovyj
Ljsbahjjh
Wpwmyvd
Nniwxcn
CreateTxjxyqrl
EndGbbkvxrsebl
Xspfspra
Wicanmbf
Nchxsyltbk
Static task
static1
Behavioral task
behavioral1
Sample
8c9113e5ad4d4e2ba4566ea6e1b99d7c3fd738775d74d5a78f2792e313b245ca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8c9113e5ad4d4e2ba4566ea6e1b99d7c3fd738775d74d5a78f2792e313b245ca.exe
Resource
win10v2004-20220812-en
Target
8c9113e5ad4d4e2ba4566ea6e1b99d7c3fd738775d74d5a78f2792e313b245ca
Size
40KB
MD5
64902b0140b8ce063f7746c33c1d0ead
SHA1
61d4f6732cf9efda536bab99b0345a2053dadde6
SHA256
8c9113e5ad4d4e2ba4566ea6e1b99d7c3fd738775d74d5a78f2792e313b245ca
SHA512
f26d48e207d35e28ccc8c61a7bafe89d45f2a4504de270405503a19d85917cedad6dace493daa2cc21492ca8111e4803f3ac92594102ca6447ea40d9676255a3
SSDEEP
768:EDY5PRz6m20rubTtR6weprYwbRCMa8f+gsyDYm:R9R+OKPQpswbLz+vm
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
AllocConsole
GetLogicalDriveStringsA
ExpandEnvironmentStringsA
EnumResourceNamesA
ReadConsoleOutputCharacterA
GetConsoleCommandHistoryA
GetConsoleAliasA
FindCloseChangeNotification
OpenEventA
GlobalGetAtomNameA
IsProcessorFeaturePresent
SetVolumeMountPointA
GetSystemDefaultUILanguage
GetTempPathA
GetCurrentProcessId
VirtualAlloc
SetCommBreak
GetCurrentThreadId
ReadConsoleA
HeapCreate
UpdateResourceA
FileTimeToDosDateTime
DeleteTimerQueue
WriteFileEx
GetStdHandle
GetFileAttributesA
GetCurrentDirectoryA
GetProcessAffinityMask
LockFile
EndUpdateResourceA
lstrcpyA
CreateTimerQueueTimer
MoveFileWithProgressA
GetModuleHandleA
GetNumberFormatA
GetBinaryType
ConvertDefaultLocale
GetThreadSelectorEntry
Thread32Next
BeginUpdateResourceA
SetFileAttributesA
GetSystemTimes
GetFileTime
FreeResource
LZStart
GetDriveTypeA
SetVolumeLabelW
FlushInstructionCache
SetCalendarInfoA
LocalUnlock
FindNextVolumeMountPointA
ReleaseMutex
ReleaseSemaphore
GetLocaleInfoA
GetThreadContext
EnumSystemLocalesA
FileTimeToLocalFileTime
IsBadStringPtrA
GetConsoleMode
LoadLibraryA
IsValidCodePage
SetConsoleWindowInfo
LoadLibraryExA
GetConsoleCursorMode
FindResourceExA
GetDiskFreeSpaceExA
GetPrivateProfileSectionNamesW
FindNextVolumeA
SetConsoleTextAttribute
GetTimeFormatA
GetDiskFreeSpaceA
WriteConsoleOutputA
GlobalLock
SetVolumeLabelA
GetCurrentProcess
DeleteTimerQueueEx
SetLocalPrimaryComputerNameA
CommConfigDialogA
ProcessIdToSessionId
FindFirstVolumeMountPointA
GetConsoleKeyboardLayoutNameA
GetCommState
GetSystemInfo
ClearCommBreak
GetProcessIoCounters
SetFileValidData
ReadConsoleInputA
OpenSemaphoreA
LCMapStringA
GetSystemTimes
GetEnvironmentVariableA
GetThreadLocale
lstrcatA
GetWindowsDirectoryA
GetCommTimeouts
ReadConsoleOutputAttribute
FindNextVolumeW
FlushViewOfFile
GlobalUnfix
GetBinaryTypeA
FindResourceExW
ReadConsoleInputA
GetConsoleTitleA
RemoveDirectoryA
GetDefaultCommConfigA
IsBadCodePtr
GetStartupInfoA
DhcpUndoRequestParams
SQLSetStmtAttr
SQLExecute
Direct3DCreate9
InitXjmhoxfpfl
Yiqhfhy
ReadNrexwrm
AddTquencitld
IsUbovdywg
Bvcftqrs
OpenBqwjgqp
BeginYwwklkpubnt
EndOxbkcxqlko
Gqspgmxovyj
Ljsbahjjh
Wpwmyvd
Nniwxcn
CreateTxjxyqrl
EndGbbkvxrsebl
Xspfspra
Wicanmbf
Nchxsyltbk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE