?NfdhpsxmawptmHmWTUFcQ@@YGEF@Z
?ycMxEHwtgifjp@@YGPAKIJ@Z
?dwuVFuCujxvyUEkbLfSCeu@@YGPAXGPAJ@Z
Static task
static1
Behavioral task
behavioral1
Sample
d4c72f51b4b641c73ad259ee8bbab6f80883cb43766a3034a673326910204503.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d4c72f51b4b641c73ad259ee8bbab6f80883cb43766a3034a673326910204503.dll
Resource
win10v2004-20221111-en
Target
d4c72f51b4b641c73ad259ee8bbab6f80883cb43766a3034a673326910204503
Size
47KB
MD5
5b7012f859a05332b6230c6589a57095
SHA1
5f4bfadb8e64a7ee4161dd981176a816bdea955d
SHA256
d4c72f51b4b641c73ad259ee8bbab6f80883cb43766a3034a673326910204503
SHA512
6258ffd98fd4f12c85139b3f2f78bcac4edd77f16af5e330ceea8c3151272c75e618e78719741186089dfb3b1b0af61e42d3a574a4c9f5c47015f9dd9423ea96
SSDEEP
768:MLecAJmhWIrpee7zRsQzsGmJPp67+ixIyR9NOXCfOgvNxvExTaw+HTd+TqA7:LcAJ5I179siCEO6NOERvIaw+HT8eA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ZwFlushKey
ZwOpenSection
IoCreateStreamFileObjectLite
RtlUnicodeToOemN
KeFlushQueuedDpcs
PoUnregisterSystemState
ExReleaseFastMutexUnsafe
MmIsDriverVerifying
RtlSecondsSince1970ToTime
IoConnectInterrupt
IoCreateSymbolicLink
PoSetPowerState
RtlUpperChar
ExRaiseAccessViolation
KeReadStateSemaphore
IoDeviceObjectType
ExIsProcessorFeaturePresent
KeDeregisterBugCheckCallback
ZwOpenKey
KdEnableDebugger
?NfdhpsxmawptmHmWTUFcQ@@YGEF@Z
?ycMxEHwtgifjp@@YGPAKIJ@Z
?dwuVFuCujxvyUEkbLfSCeu@@YGPAXGPAJ@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ