Lpjly
LvyLimeYl
JrbqziiAvetWuaphObk
Static task
static1
Behavioral task
behavioral1
Sample
d9149b67278e9584cd0e230d89fcc4ab9a1b126c0768865f5a49c25e87006c9c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d9149b67278e9584cd0e230d89fcc4ab9a1b126c0768865f5a49c25e87006c9c.exe
Resource
win10v2004-20221111-en
Target
d9149b67278e9584cd0e230d89fcc4ab9a1b126c0768865f5a49c25e87006c9c
Size
69KB
MD5
914e289e345acd1bee907911f9e7e79b
SHA1
563b963e55b237d35e023ae49f31e740996dd8b0
SHA256
d9149b67278e9584cd0e230d89fcc4ab9a1b126c0768865f5a49c25e87006c9c
SHA512
7521e98e345e9cc03ef01979fa1e6f46880b8bc7cda3ef94d41b8c2a18d09f4cf49ae16d7f6cc3792ebff9d93e95cb3dee5b34f6de8fb8d7733750c55f1d00d3
SSDEEP
1536:PjXGayZy9Y5zd2waU3hpVzmO/KYUKPg4DO91SR1kMsA1:DGeeBd2w1Vzm7YpC9AR1kV
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileMappingW
DeleteFileW
ExitProcess
GetStringTypeA
CreateMutexA
SetFileAttributesA
InterlockedIncrement
SystemTimeToTzSpecificLocalTime
CopyFileA
GetWindowsDirectoryA
SetUnhandledExceptionFilter
GetTickCount
LoadLibraryA
VirtualFree
VirtualAllocEx
FindAtomA
CreateHardLinkW
DeleteFileA
ConvertDefaultLocale
GetTimeZoneInformation
GetUserDefaultLangID
GetModuleHandleA
MoveFileA
GetModuleFileNameA
WritePrivateProfileStringA
CreateHardLinkA
VirtualAlloc
OpenFile
CopyFileExW
_localtime64
??0bad_cast@@QAE@ABV0@@Z
fwprintf
fwscanf
_ismbbalnum
is_wctype
_telli64
iscntrl
_mbbtombc
_j0
_execlp
strstr
_statusfp
memcpy
_inp
wcstol
isdigit
MoveToEx
GetDeviceCaps
GetPixel
DeleteObject
CreateCompatibleBitmap
GetObjectW
CreateSolidBrush
SetStretchBltMode
SetViewportExtEx
GetTextFaceW
GetNearestColor
SetRectRgn
SetBkMode
SetMapMode
SetPixel
TranslateAcceleratorW
EnableWindow
LoadCursorW
EnumChildWindows
GetDlgItemTextW
UnregisterClassA
TranslateMessage
MonitorFromWindow
GetMessageExtraInfo
GetSubMenu
LoadImageW
SendMessageW
GetKeyState
GetSystemMetrics
GetDC
SetFocus
SetWindowTextW
LoadRemoteFonts
mciDriverYield
mod32Message
mmTaskSignal
joyGetDevCapsW
waveInClose
mciSendStringW
Lpjly
LvyLimeYl
JrbqziiAvetWuaphObk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ