CmxcnpaZcheuy
UbuHpenPnljjXy
Static task
static1
Behavioral task
behavioral1
Sample
61a24cefb8511bace9a86be1be31bd29998157f8e61b128336fb45ff049fb21e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
61a24cefb8511bace9a86be1be31bd29998157f8e61b128336fb45ff049fb21e.exe
Resource
win10v2004-20220901-en
Target
61a24cefb8511bace9a86be1be31bd29998157f8e61b128336fb45ff049fb21e
Size
70KB
MD5
0b1ebb5ce02d79535b5e787a0a1efacf
SHA1
2cbf41e3431a603f2fd402d738509b126cdf0c36
SHA256
61a24cefb8511bace9a86be1be31bd29998157f8e61b128336fb45ff049fb21e
SHA512
9b57bdffc5a4eb633a4666bdc0aa1222a23b2c42929778d3827b0dcb26e90d1b4f9d4570eb9e4c9b7fc44dd684d2f1b911c490391473be56face2c6addb0c3b2
SSDEEP
1536:/0HEhobEW65rpIKtEA/cn+0pAq7XMWfR6g2N:Lop87tb0y2FfRN
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RtlAppendStringToString
RtlInitString
RtlIsValidOemCharacter
RtlCompareUnicodeString
NtQueryEaFile
PsLookupThreadByThreadId
RtlFreeUnicodeString
IoAllocateMdl
ExAcquireResourceExclusiveLite
RtlAnsiStringToUnicodeString
RtlCopyLuid
NtQueryInformationProcess
ZwOpenFile
ObReferenceObjectByPointer
ExExtendZone
ExFreePool
RtlUpcaseUnicodeStringToAnsiString
memcpy
ExAllocatePool
ZwMapViewOfSection
SeSinglePrivilegeCheck
SeDeassignSecurity
RtlImageNtHeader
ZwCreateSection
ClassSetFailurePredictionPoll
ClassDeleteSrbLookasideList
ClassCheckMediaState
ClassAsynchronousCompletion
ClassQueryTimeOutRegistryValue
HalInitializeProcessor
HalGetAdapter
KeRaiseIrqlToDpcLevel
WRITE_PORT_USHORT
KeTryToAcquireQueuedSpinLock
READ_PORT_BUFFER_UCHAR
HalProcessorIdle
ExAcquireFastMutex
HalStopProfileInterrupt
KeReleaseQueuedSpinLock
IoFreeAdapterChannel
HalAcquireDisplayOwnership
HalReturnToFirmware
HalSetBusData
CmxcnpaZcheuy
UbuHpenPnljjXy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ