CreateEsueslppd
Bmvijdtbtk
Mjlohpskqm
CreateBtabxjd
Static task
static1
Behavioral task
behavioral1
Sample
e0bcc9a24b92c5b2e378f46ef74a1ab221af0d5a687b190ae30575cb45c43997.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e0bcc9a24b92c5b2e378f46ef74a1ab221af0d5a687b190ae30575cb45c43997.exe
Resource
win10v2004-20220812-en
Target
e0bcc9a24b92c5b2e378f46ef74a1ab221af0d5a687b190ae30575cb45c43997
Size
80KB
MD5
0ac9000dccb7d8946e99ca94ef5bf164
SHA1
4ef5560c2512bffcc457e917f00a4097dc8cd0ae
SHA256
e0bcc9a24b92c5b2e378f46ef74a1ab221af0d5a687b190ae30575cb45c43997
SHA512
8ba3f41c8b377a4c04942d249e68d8c2fc00f1fc199c153d8dd2e599b4ff8c47389aebde979718db79b0dd7e818be79158921bae9d5f0cf4d731e36b95bf73fc
SSDEEP
1536:IuFfkQFV+vMuIbxV9JtDt6s6knWkc3flExjkRwLg:IuF/FCMuIbx/R6kWT3OxIRt
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
DeleteFileA
GetTempFileNameA
CloseHandle
GetModuleHandleA
lstrcmpiA
GetCommandLineA
GetStartupInfoA
ExitProcess
NtSetEvent
islower
RtlQueryProcessHeapInformation
ZwWriteFileGather
NtInitiatePowerAction
ZwRemoveIoCompletion
RtlFindLastBackwardRunClear
CsrCaptureTimeout
RtlLargeIntegerArithmeticShift
RtlImpersonateSelf
NtSetDefaultLocale
NtSetInformationJobObject
RtlGetSecurityDescriptorRMControl
_stricmp
strncat
RtlSetSecurityDescriptorRMControl
RtlCopyString
ZwCreateSymbolicLinkObject
CreateEsueslppd
Bmvijdtbtk
Mjlohpskqm
CreateBtabxjd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ