IpizcfAcmvvdWqu
OsvFuvvGhbfDn
GfeKmpxvAbljKm
Static task
static1
Behavioral task
behavioral1
Sample
135b0ab608b95b74c2d37d228ba6d3572e172d505257d6bfb03da956c8416054.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
135b0ab608b95b74c2d37d228ba6d3572e172d505257d6bfb03da956c8416054.exe
Resource
win10v2004-20220812-en
Target
135b0ab608b95b74c2d37d228ba6d3572e172d505257d6bfb03da956c8416054
Size
20KB
MD5
0ff4f7b7192195392304432c28d78477
SHA1
16379f93866160c745182780e91f282828347e20
SHA256
135b0ab608b95b74c2d37d228ba6d3572e172d505257d6bfb03da956c8416054
SHA512
6ca44d1156a327d2cfec0c9dfdc15fc1ac680eff1ace98d3e65d4e1002a9d1e77fcb11536f30fa8bb46a1acd6390dbba2661bade3545e052d8eb519b382224d1
SSDEEP
384:QeOyq0p9+JThNk5QLJgI9Lhj7LYOPNunW1WkW781gW:Qe3dWhiQNgCLhpEC1
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
CcGetFlushedValidData
ZwSetInformationFile
memcpy
ZwDisplayString
ExFreePoolWithTag
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
strlen
DbgPrint
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
RtlImageNtHeader
IoCreateSymbolicLink
ExAllocatePool
strcmp
CcGetDirtyPages
MmIsAddressValid
CcGetFileObjectFromSectionPtrs
PsRestoreImpersonation
IpizcfAcmvvdWqu
OsvFuvvGhbfDn
GfeKmpxvAbljKm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ