fvsuuysuxxjjj
mdnydxyhe
zpukgmukzhuykrc
Static task
static1
Behavioral task
behavioral1
Sample
e8e66f91f8db8e0d1587eda4f18a855c7901099f3a2cec5891dfeda82115181c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8e66f91f8db8e0d1587eda4f18a855c7901099f3a2cec5891dfeda82115181c.exe
Resource
win10v2004-20220901-en
Target
e8e66f91f8db8e0d1587eda4f18a855c7901099f3a2cec5891dfeda82115181c
Size
128KB
MD5
af4ba338d733ff7f933192e74f4fcab2
SHA1
24ba1074badcfc4a9a6f6510b415df567c3cf72d
SHA256
e8e66f91f8db8e0d1587eda4f18a855c7901099f3a2cec5891dfeda82115181c
SHA512
22a226a4f4243960df68b2d9d2a0985a545a4fa91dacc60aa1e969f43115e723eb5866b136ca2e2f62f28ac543b1eb5f8270ae64771343ccd0b2fb143fcb9f21
SSDEEP
1536:yRhaW9yRFmj3/Iruw3It/7avoXMBgITL9xJOCnFtLo+NiI1IW:yRhaW9UoLWusvocBvT5x1Fi+NJZ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
VirtualAlloc
HeapAlloc
TerminateProcess
LoadLibraryA
IsBadReadPtr
lstrcmpiA
GetProcAddress
GetStringTypeW
AssignProcessToJobObject
GetProcessHeap
UpdateResourceA
RedrawWindow
TrackPopupMenuEx
DefDlgProcA
EndPath
GetCurrentPositionEx
GetTextCharsetInfo
StrokePath
fvsuuysuxxjjj
mdnydxyhe
zpukgmukzhuykrc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ