?GetJlfkjdslgjd@@YGIXZ
?GetKJFLfldhgkfdlkhgfd@@YGIXZ
?GetKJLjgfdlkjhflkj@@YGIXZ
?GetLKfldskgldkjhlfh@@YGIXZ
?KJdfjKLJgfdgfdjkngf@@YGIXZ
?KJfdJHgjfdkjhfd@@YGIXZ
Static task
static1
Behavioral task
behavioral1
Sample
78862b443d8f2881b0a6d932020761c17abac757544e85d48e073dea665a0734.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
78862b443d8f2881b0a6d932020761c17abac757544e85d48e073dea665a0734.exe
Resource
win10v2004-20220812-en
Target
78862b443d8f2881b0a6d932020761c17abac757544e85d48e073dea665a0734
Size
41KB
MD5
cbb3212820041cedd1d7d26e7bd52cb4
SHA1
439ae0117788329b3e40aedd55dc1c055626c829
SHA256
78862b443d8f2881b0a6d932020761c17abac757544e85d48e073dea665a0734
SHA512
22cef712019c7b8c290a1be211fe566104ddd50d3d2745c8417fdd091a281619b4140f71b4eeafd4d0bf18030bcdb8944c195a9f317b462f5255173523412264
SSDEEP
768:PkJp3f23mJ8rxK+fWDhGwpnFY1CxXUxB5NOCddXIZsJx54O8V3ifF:P63pJ8rx6bVOgm9OCddXIZo3j8V3I
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExFreePoolWithTag
ExAllocatePool
memset
RtlInitializeBitMap
RtlAppendUnicodeStringToString
RtlAreBitsSet
RtlAreBitsClear
IoDeleteSymbolicLink
?GetJlfkjdslgjd@@YGIXZ
?GetKJFLfldhgkfdlkhgfd@@YGIXZ
?GetKJLjgfdlkjhflkj@@YGIXZ
?GetLKfldskgldkjhlfh@@YGIXZ
?KJdfjKLJgfdgfdjkngf@@YGIXZ
?KJfdJHgjfdkjhfd@@YGIXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ