GetFyyhmown
OpenMjiklkntfna
Eajgexkq
Static task
static1
Behavioral task
behavioral1
Sample
a681765f8c37c0d308256699a370fbcd2187979ef664891218683a4823b51a6a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a681765f8c37c0d308256699a370fbcd2187979ef664891218683a4823b51a6a.exe
Resource
win10v2004-20220812-en
Target
a681765f8c37c0d308256699a370fbcd2187979ef664891218683a4823b51a6a
Size
189KB
MD5
5aafe7b2b5dae3b9e0b653c75e7372e9
SHA1
98349d43efeb9f8ea7832653134bcff8f3ab0b8c
SHA256
a681765f8c37c0d308256699a370fbcd2187979ef664891218683a4823b51a6a
SHA512
e69085ffd35bd543af0fe612c118d6e93dc709469e14dd22217dc88137795658f3046e406030d6768366b479ea4c12ffe95434fa1ef82dfae22febe36fddead0
SSDEEP
3072:+z2gyVacVcQXHO6futceuD28XjtFpI1i7ggZAtgf7NRFKDE7PLAg:RTXHO6GWB/jtlx/Ko
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetProcessVersion
MoveFileA
VirtualProtect
GetTempFileNameA
CloseHandle
GetCommandLineA
GetStartupInfoA
ExitProcess
NtQueryInformationToken
RtlMoveMemory
NtCurrentTeb
ZwCreateWaitablePort
RtlImpersonateSelf
GetFyyhmown
OpenMjiklkntfna
Eajgexkq
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ