_Expr3iHr8wkdC7@8
4o_c9l1D0T
_3wnTHWcqjzd85t
_Mdr3VH_dy0T
_qtaBocvavX@16
Static task
static1
Behavioral task
behavioral1
Sample
0da2c097b96dd93e66e2b699d9a03d1ff1c6642e7febb393ee1fc2706b38df98.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0da2c097b96dd93e66e2b699d9a03d1ff1c6642e7febb393ee1fc2706b38df98.dll
Resource
win10v2004-20221111-en
Target
0da2c097b96dd93e66e2b699d9a03d1ff1c6642e7febb393ee1fc2706b38df98
Size
179KB
MD5
7d470f83452d29b43fd7a24d3db28d90
SHA1
dcee52402c849bf35b9c452bdad43089c8d35f5d
SHA256
0da2c097b96dd93e66e2b699d9a03d1ff1c6642e7febb393ee1fc2706b38df98
SHA512
710e7a713a84fdf18027a90f3e7f937d26530e2ef859b00d64f0fafc906a00779fc188a7ebbb206ce65ee2e7132366d5c172e7af6818c5328596b089abe3feae
SSDEEP
3072:C+Erpvrgi25CthBbiBnsi5Y2Gx/oP01QdsUlb6uOB0R/a6RIrWY:C+OvrTwChiqozJb6bB0R/nRw
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VerFindFileA
GetFileVersionInfoSizeA
ImageList_Remove
GetCommandLineW
GetCurrentProcessId
IsBadHugeReadPtr
ExitProcess
GetStartupInfoA
GlobalAlloc
GetModuleHandleA
FindResourceA
InitializeCriticalSection
GetACP
LockResource
GetStdHandle
lstrlenA
GetLastError
LocalAlloc
SetEndOfFile
VirtualAlloc
GetProcAddress
GetCPInfo
SetEvent
LoadResource
CreateMenu
SetWindowPos
GetMenuItemCount
GetMenu
SetWindowPlacement
GetCursor
SetWindowLongA
IsCharUpperA
CreateBrushIndirect
CreateBitmap
CopyEnhMetaFileA
_Expr3iHr8wkdC7@8
4o_c9l1D0T
_3wnTHWcqjzd85t
_Mdr3VH_dy0T
_qtaBocvavX@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ