Kabjktt
BeginChrrknsu
Djnpesvwygh
Omeqpekk
Static task
static1
Behavioral task
behavioral1
Sample
c6350fb2524fc1ca112b701653e206e1a46d9245a4d84214cc2b79a1b9fb474f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6350fb2524fc1ca112b701653e206e1a46d9245a4d84214cc2b79a1b9fb474f.exe
Resource
win10v2004-20220812-en
Target
c6350fb2524fc1ca112b701653e206e1a46d9245a4d84214cc2b79a1b9fb474f
Size
77KB
MD5
f7a2c537376320bda8ea534fc759e2c0
SHA1
8753c21403a2819bb91cabf46162d1b268793fc5
SHA256
c6350fb2524fc1ca112b701653e206e1a46d9245a4d84214cc2b79a1b9fb474f
SHA512
52ddb75962dd47775b0cee1251f0dc865a097292b30fa889ebf533116f56a5248264285f456aeb8e757edfa028f579a5daa5c2b015c049c1fecc9c08224ee8b1
SSDEEP
1536:qt0tVOouE7C3XGXIlReiBMAyuzSyr24qbMHsl8aKpVQkqPuMoH:VtooXC3X/aiBMp+SJ4qoM0p22H
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetCurrentProcess
GetVolumeNameForVolumeMountPointA
VirtualProtectEx
ExitProcess
DestroyCaret
GetActiveWindow
GetWindowLongW
Kabjktt
BeginChrrknsu
Djnpesvwygh
Omeqpekk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ