Wwaplii
InitVghwhfd
Iahamxnc
Wherynn
Static task
static1
Behavioral task
behavioral1
Sample
b1331b7a5b369d2116fbba09a0ae1e3b3451151bea735177c92ff085d90a61a1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1331b7a5b369d2116fbba09a0ae1e3b3451151bea735177c92ff085d90a61a1.exe
Resource
win10v2004-20220812-en
Target
b1331b7a5b369d2116fbba09a0ae1e3b3451151bea735177c92ff085d90a61a1
Size
145KB
MD5
0bb34866c827f1aff16882a04481f015
SHA1
672dcc36a4eda724b6f0590614d116a54fd9cba3
SHA256
b1331b7a5b369d2116fbba09a0ae1e3b3451151bea735177c92ff085d90a61a1
SHA512
c66a0bcb479cfc126cbc6bf8ad5083dfe6b3d034c2b02ec9a11a822162d2143bf2e08a02447e662b509b6d21405221b40ecae774b5f19e104f6f5aea03e457e6
SSDEEP
3072:q4BirmpuHEyEnoQR7N71z5DV7W27LcqFBsFJi0Mq2saRg:quiZHEyEnoEZzry27DsXiLUB
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetCurrentProcess
ResetEvent
VirtualProtectEx
ExitProcess
DestroyCaret
GetActiveWindow
GetWindowLongW
NtReadFile
Wwaplii
InitVghwhfd
Iahamxnc
Wherynn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ