CreateSecoaasm
Uivosmu
ReadYmrircf
SetCivtxqnxyet
Static task
static1
Behavioral task
behavioral1
Sample
8dc9335c4ea605e647fa5c70faf6f5d21a210ff2c3a9eba4ed09171073c6c9fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8dc9335c4ea605e647fa5c70faf6f5d21a210ff2c3a9eba4ed09171073c6c9fa.exe
Resource
win10v2004-20221111-en
Target
8dc9335c4ea605e647fa5c70faf6f5d21a210ff2c3a9eba4ed09171073c6c9fa
Size
77KB
MD5
42d1db6845f9a732c5a3e0d5c430b77c
SHA1
437dbd85ee7081fe88387140ffb2c2ced8bc70b5
SHA256
8dc9335c4ea605e647fa5c70faf6f5d21a210ff2c3a9eba4ed09171073c6c9fa
SHA512
a683d5cf796b14948b4eb91dc557271bd831450568e746d9c3dd055be4f5469a22a68d126d0abe90cee80faff43ce98b5f138138bdec67e5baa4fb748e78997e
SSDEEP
1536:PX/J3fE8BAz6UC4aP4TBF4d9WhbjSnF+3i6VsFHLkU9P2Kfjaq0aE1BqAAu:JPE7z6Uz+4T8WKF+yUsRLkUn+qc1gxu
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetCurrentProcess
GetVolumeNameForVolumeMountPointA
VirtualProtectEx
ExitProcess
DestroyCaret
GetActiveWindow
GetWindowLongW
CreateSecoaasm
Uivosmu
ReadYmrircf
SetCivtxqnxyet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ