skwntcknwxartgw
vjshgspns
wzqkxjslxzfv
Static task
static1
Behavioral task
behavioral1
Sample
9866f93e19a266d66c855b8d9dabcc11bdbaf5a54b733459d80fcf0b0a492aa3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9866f93e19a266d66c855b8d9dabcc11bdbaf5a54b733459d80fcf0b0a492aa3.exe
Resource
win10v2004-20220812-en
Target
9866f93e19a266d66c855b8d9dabcc11bdbaf5a54b733459d80fcf0b0a492aa3
Size
117KB
MD5
30b62987fa819974e66f9e07866711d1
SHA1
e867816d4732293ee45cdc6830c99a7ae8fa8e1b
SHA256
9866f93e19a266d66c855b8d9dabcc11bdbaf5a54b733459d80fcf0b0a492aa3
SHA512
046211f6ba6cda45dbb0fe961261f1a9d56f184d393c88b55b99fb768d98a21da31679d6c566cfaa179f6bd4c9a4b959481999bd7564452010680989b78b42e2
SSDEEP
1536:8fu36MxMl4PGfOrT9BSLYmz/BctRZ/0DeMsC6OqCntLRdoX:8fu36sME9cEmW3mdCOqUt0X
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
lstrcmpiA
TerminateProcess
IsBadReadPtr
VirtualAlloc
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
CreateNamedPipeW
AnimateWindow
BitBlt
GetTextCharsetInfo
CreateFontW
StartServiceW
skwntcknwxartgw
vjshgspns
wzqkxjslxzfv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ