WriteBjwjpos
SetHeewnibto
EndHpvwpqvwl
SetJmyseyom
Static task
static1
Behavioral task
behavioral1
Sample
f999ee2381b4cf07c4f9da2aef1a9c6167f1134dbb94532c708ce0b3f2fac38c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f999ee2381b4cf07c4f9da2aef1a9c6167f1134dbb94532c708ce0b3f2fac38c.exe
Resource
win10v2004-20221111-en
Target
f999ee2381b4cf07c4f9da2aef1a9c6167f1134dbb94532c708ce0b3f2fac38c
Size
28KB
MD5
26cb201177386db884c4c24856d0ab81
SHA1
dcb22b83a956a44176bab9c1bcd7db5e4c91bc5e
SHA256
f999ee2381b4cf07c4f9da2aef1a9c6167f1134dbb94532c708ce0b3f2fac38c
SHA512
eb5a4c555ae07c314d5b9c463bae47428c4517ce54bc5e7f26c8e43c77b6c77e7f66efd6575f4fe15bef05f4fcbca2e1f74f9d0d945c1a39957c6f6597fc8b10
SSDEEP
768:31ItImsPIjbXKE15JgKBrLjGB+plWWjagS4:31ItI7eXKoaKoB+poMan
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetProcessVersion
MoveFileA
VirtualProtectEx
ExitProcess
ZwConnectPort
RtlEqualUnicodeString
NtSetDefaultUILanguage
ZwMapUserPhysicalPagesScatter
CharUpperA
CheckMenuItem
EmptyClipboard
DeferWindowPos
WriteBjwjpos
SetHeewnibto
EndHpvwpqvwl
SetJmyseyom
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ