_Ngz2BXOD9T
v2uCtw8@8
yjJlU
Static task
static1
Behavioral task
behavioral1
Sample
ce9f76b5b5f28a231ac463d76dd5b5a62128d4c0e36b7d1f247698c75dbffcf8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ce9f76b5b5f28a231ac463d76dd5b5a62128d4c0e36b7d1f247698c75dbffcf8.exe
Resource
win10v2004-20220812-en
Target
ce9f76b5b5f28a231ac463d76dd5b5a62128d4c0e36b7d1f247698c75dbffcf8
Size
101KB
MD5
56665c4a8841be9d0834fec028b0c9e5
SHA1
ab281b99d0641c01b64b59ad898133b49a9d08c2
SHA256
ce9f76b5b5f28a231ac463d76dd5b5a62128d4c0e36b7d1f247698c75dbffcf8
SHA512
7a2c76e832ff895e774a4675320e26ecb0529deea0dfa88b9776aff07ffcff05ef0ef2358ddcde328959c437b12f098b0fab87312cef9480095027d81b605f3a
SSDEEP
1536:Vyxx+Z7Oypa1uQCQexEDEORmb9ULhRximh5LQngMMCX4mP:+xL2a1O4EORi9anf93MMCoK
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PathIsContentTypeA
SHQueryValueExA
PathGetCharTypeA
ExitProcess
FindResourceA
GetACP
GetVersion
GetCommandLineW
GetModuleFileNameA
GetLastError
GetProcessHeap
VirtualFree
GetFullPathNameA
GetFileSize
GetCommandLineA
IsBadReadPtr
GetCurrentThreadId
GetTickCount
GetStringTypeW
LoadLibraryA
lstrcmpA
VirtualAllocEx
GetStringTypeA
GetSystemDefaultLangID
GetFileAttributesA
GetStartupInfoA
MulDiv
SHFileOperationA
GetMenu
MapWindowPoints
MapVirtualKeyA
OemToCharA
OffsetRect
IsCharLowerA
GetCursor
CharUpperA
_Ngz2BXOD9T
v2uCtw8@8
yjJlU
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ