CFCJO94C
DDGPIUCK
KGQZ0ND8
UKEG3H6Z
Z8WMDU8P
Static task
static1
Behavioral task
behavioral1
Sample
e15e765d7a7738895480b468f58306999f14d93f41e9a508fc86942a64b07a25.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e15e765d7a7738895480b468f58306999f14d93f41e9a508fc86942a64b07a25.exe
Resource
win10v2004-20221111-en
Target
e15e765d7a7738895480b468f58306999f14d93f41e9a508fc86942a64b07a25
Size
695KB
MD5
ff969ebf29055c5b5def7f28d6af61f0
SHA1
7fe7f23697c804a252b1afd474a7fbb9e7c58974
SHA256
e15e765d7a7738895480b468f58306999f14d93f41e9a508fc86942a64b07a25
SHA512
e917c1d4b64027a700653499511acdd459a6a85beff5c46365682a1a5a991d58948ed62dca160a67d80dc8f4360dddd0bd52c7f8ef94503f712b01b65fd45954
SSDEEP
12288:UUd+R0xFYgonWqzxTYY5a2NmOZkQA/zmZ99ypmDCWAzpFet:UUAwFaWqSohDSmZ99vCWATet
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MoveFileExA
HeapFree
WriteFile
DeleteFileA
Sleep
ReadFile
HeapAlloc
GetProcessHeap
GetFileSize
GetTickCount
lstrlenA
ExitProcess
lstrcatA
lstrcpyA
CopyFileA
GetTempPathA
GetModuleFileNameA
GetCommandLineA
GetCurrentThreadId
CloseHandle
CreateFileA
CreateProcessA
RtlUnwind
wsprintfA
GetMessageA
PostThreadMessageA
GetInputState
StrStrIA
StrRChrA
CFCJO94C
DDGPIUCK
KGQZ0ND8
UKEG3H6Z
Z8WMDU8P
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ