TmNbpnm
WkpgodaBwuh
RjgdXljfWoxymb
DdYzechRkpbxCvmzio
Static task
static1
Behavioral task
behavioral1
Sample
ab7270802c9e88d79a0c3e021ffa44473c8c79e67941f41b7fc00ce4bde106b4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ab7270802c9e88d79a0c3e021ffa44473c8c79e67941f41b7fc00ce4bde106b4.exe
Resource
win10v2004-20220812-en
Target
ab7270802c9e88d79a0c3e021ffa44473c8c79e67941f41b7fc00ce4bde106b4
Size
443KB
MD5
026198a33f29cd8ff4e9f4eb3f57278a
SHA1
d3ed7898e306e66a5d0385c1828027ba202edf54
SHA256
ab7270802c9e88d79a0c3e021ffa44473c8c79e67941f41b7fc00ce4bde106b4
SHA512
8cc056f4f400720ee15c46844a3dd067aa69d7840611bad6507d53b9d6efe99a2c5bd9d8ce3648d442b42a3b9fd5324084a39712a4fc32a3ab1c6000d1be62f1
SSDEEP
6144:e/ty+tUHIrMbA96Vid9szw77k6M8i1cES128JV3Lk1q13+pKSSFxi8d0Q7kTUxY2:ely+tUHkJs0MO128JtpuY9ccSI8tAZH
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
isdigit
InbvCheckDisplayOwnership
wcstombs
PoRegisterSystemState
isupper
memcpy
islower
ZwDuplicateToken
IoSetSystemPartition
ExAcquireSharedStarveExclusive
KeSetIdealProcessorThread
MmGetPhysicalAddress
IoQueryFileDosDeviceName
RtlFindSetBitsAndClear
ExInterlockedExtendZone
NtWriteFile
KeRegisterBugCheckReasonCallback
ExFreePoolWithTag
memchr
towlower
MmRemovePhysicalMemory
_alldvrm
ExDeletePagedLookasideList
ExAcquireSharedWaitForExclusive
strcmp
LpcRequestPort
IoConnectInterrupt
RtlDowncaseUnicodeString
DbgPrint
strrchr
FsRtlIsNameInExpression
MmFreeContiguousMemorySpecifyCache
ZwInitiatePowerAction
ExAllocatePool
strspn
ZwQueryInformationProcess
isspace
RtlImageNtHeader
PsSetProcessPriorityByClass
MmUnsecureVirtualMemory
IoSetPartitionInformation
FsRtlInitializeOplock
TmNbpnm
WkpgodaBwuh
RjgdXljfWoxymb
DdYzechRkpbxCvmzio
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ