EndFxwsykha
Qbwnjpokvh
CreateBrgjnhpwc
Static task
static1
Behavioral task
behavioral1
Sample
cfd22c7c570fa4448813c420a65739bf5bcb5a0ed0a7e93ad86289138badc6dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfd22c7c570fa4448813c420a65739bf5bcb5a0ed0a7e93ad86289138badc6dd.exe
Resource
win10v2004-20220812-en
Target
cfd22c7c570fa4448813c420a65739bf5bcb5a0ed0a7e93ad86289138badc6dd
Size
79KB
MD5
bfde2797a4231838f7367f89a6da8e4a
SHA1
ef457897b09522322c38d209e02990d53e4a5bd5
SHA256
cfd22c7c570fa4448813c420a65739bf5bcb5a0ed0a7e93ad86289138badc6dd
SHA512
13a06dd3634e017e8b8ff842b4265a274b8bb2a488a49836e791fdda85d55d1d728705ee42a9203c24241f4ec18dbdac0afca497afb7cc0d933a85dc8da09df8
SSDEEP
1536:dXQPlXidZUOF0PVR6Qh9O3XaUwXLQsKQ+gSs9Qeg3OoPi:2lXijd0PVRP83XaUMXKQl9Qes6
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
DeleteFileA
GetTempFileNameA
CloseHandle
GetModuleHandleA
lstrcmpiA
GetCommandLineA
GetStartupInfoA
ExitProcess
ZwQueryObject
VerSetConditionMask
wcschr
ZwOpenObjectAuditAlarm
memset
NtMapUserPhysicalPages
ZwSetSecurityObject
NtLockVirtualMemory
RtlAddAccessDeniedAce
NtQueryEaFile
RtlpUnWaitCriticalSection
ZwAssignProcessToJobObject
ZwOpenSection
RtlNumberOfSetBits
ZwQueryIoCompletion
ZwRequestPort
RtlAllocateHeap
RtlUlongByteSwap
RtlValidRelativeSecurityDescriptor
_ultow
EndFxwsykha
Qbwnjpokvh
CreateBrgjnhpwc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ