_Ngz2BXOD9T
v2uCtw8@8
yjJlU
Static task
static1
Behavioral task
behavioral1
Sample
d2856587635b7fc1b4514366974a075ee77b6fca3b7259883ea5fcf36db9d44a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d2856587635b7fc1b4514366974a075ee77b6fca3b7259883ea5fcf36db9d44a.exe
Resource
win10v2004-20221111-en
Target
d2856587635b7fc1b4514366974a075ee77b6fca3b7259883ea5fcf36db9d44a
Size
101KB
MD5
0183724612c2df363feefea13ee8bd6c
SHA1
2319d3b82e56fe0febb059386b8d90802e5ab6f7
SHA256
d2856587635b7fc1b4514366974a075ee77b6fca3b7259883ea5fcf36db9d44a
SHA512
49084e0110edad4975e174149809d101b0b8260ac9297ae97ae4e55e76f129009988c1fefeb0facbb5cefbdebf1e85414cdebe4604cccb360a407cecc0615602
SSDEEP
1536:Vyxx+Z7Oypa1uQCQgxEDEORmb9ULhRximh5LQngMMCX4mP:+xL2a1OWEORi9anf93MMCoK
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PathIsContentTypeA
SHQueryValueExA
PathGetCharTypeA
ExitProcess
FindResourceA
GetACP
GetVersion
GetCommandLineW
GetModuleFileNameA
GetLastError
GetProcessHeap
VirtualFree
GetFullPathNameA
GetFileSize
GetCommandLineA
IsBadReadPtr
GetCurrentThreadId
GetTickCount
GetStringTypeW
LoadLibraryA
lstrcmpA
VirtualAllocEx
GetStringTypeA
GetSystemDefaultLangID
GetFileAttributesA
GetStartupInfoA
MulDiv
SHFileOperationA
GetMenu
MapWindowPoints
MapVirtualKeyA
OemToCharA
OffsetRect
IsCharLowerA
GetCursor
CharUpperA
_Ngz2BXOD9T
v2uCtw8@8
yjJlU
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ