IsPgvapxpuplx
Awkbugfxywv
Static task
static1
Behavioral task
behavioral1
Sample
ad42d7a7c092f5103449f182762fcf9c5f55cab139f7eb09ad5f11e44074bdfd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ad42d7a7c092f5103449f182762fcf9c5f55cab139f7eb09ad5f11e44074bdfd.exe
Resource
win10v2004-20220812-en
Target
ad42d7a7c092f5103449f182762fcf9c5f55cab139f7eb09ad5f11e44074bdfd
Size
82KB
MD5
fe9125c678ec0be60d53a89134c921b6
SHA1
ecbaeec6862f63f28be112e9c9c21b0abb09c72d
SHA256
ad42d7a7c092f5103449f182762fcf9c5f55cab139f7eb09ad5f11e44074bdfd
SHA512
94e80a771f80318f01db618dcb042f877d37026391a758b4c07039ddc279b960cb91b73f221d9d88e9931ce0cdbcbff1f690a3570de77cf6071de7886d4af1b4
SSDEEP
1536:SdefZRQv1E+HWEnTdnjB9113Y3CSlzSWAuEDmsPHpYdAbA8u64I3aM6SY:xfZRbQTn5nj71d8LLELPJoYANphS
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetProcessVersion
MoveFileA
VirtualProtect
GetTempFileNameA
CloseHandle
GetCommandLineA
GetStartupInfoA
ExitProcess
NtSetLowEventPair
NtUnloadKey
ZwTerminateThread
ZwUnloadKey
IsPgvapxpuplx
Awkbugfxywv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ