Ndjtfaoi
IsNxmytimj
OpenEeovlouyup
BeginCxbxlddmgac
Static task
static1
Behavioral task
behavioral1
Sample
825e02ca4d9ad2fb9f7e5883996f82f86b7019410c4b2b0b8a46898a81458045.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
825e02ca4d9ad2fb9f7e5883996f82f86b7019410c4b2b0b8a46898a81458045.exe
Resource
win10v2004-20220901-en
Target
825e02ca4d9ad2fb9f7e5883996f82f86b7019410c4b2b0b8a46898a81458045
Size
76KB
MD5
97d3336a14e70b3bfd156ac357b0074f
SHA1
814421c0d2ba600be6e510467ad3c92b0fcbfc1e
SHA256
825e02ca4d9ad2fb9f7e5883996f82f86b7019410c4b2b0b8a46898a81458045
SHA512
2b59d8bbbaf05498f6fc8c7a3cedbd21e3beba707f9bceacf72ff782b7b28f6c62a3333112931ed7d9634271819541c187fdccf50494dac7d354464277f23f7e
SSDEEP
1536:pt0mbeR1rRv1ZME4d2ypY8tI186v2zKaAw128A52NAAMKq1uInEjvmnfE:U9R1rpodvpI1VezK5w1wEm1ASfE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetCurrentProcess
ReplaceFileA
VirtualProtectEx
ExitProcess
CharUpperA
CheckMenuItem
EmptyClipboard
DeferWindowPos
Ndjtfaoi
IsNxmytimj
OpenEeovlouyup
BeginCxbxlddmgac
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ