Cmaoapkbd
Uvtnoeisk
Static task
static1
Behavioral task
behavioral1
Sample
4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd.exe
Resource
win10v2004-20220812-en
Target
4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd
Size
64KB
MD5
39c5dfd26eb0953e2c39e8f16e439d18
SHA1
129cc4356400537a182c3bcfe75561dcc3da0a6a
SHA256
4e3874533af3c127a125a774c6d8a585f6e5ae878aebae68465cf5287839a8bd
SHA512
c0ad98b899668acb5b75bc890f4939c1da75157ebfc823e5b0d7d0f88b179f4e16710dca3ad3412c797429bfba32c4765bc8d7b4c26259dd9313adeafd3b19bb
SSDEEP
1536:oTrHXebs0VdG/4o0L0/e+7+iIcOemGSUGlH8:yHys0VdTPlee3lH8
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GlobalAlloc
GetThreadLocale
VirtualAlloc
GlobalUnlock
GlobalFree
MoveFileExW
GlobalLock
GetDriveTypeA
lineSetCallData
SetFocus
GetWindow
DragObject
Cmaoapkbd
Uvtnoeisk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE