IpizcfAcmvvdWqu
OsvFuvvGhbfDn
GfeKmpxvAbljKm
Static task
static1
Behavioral task
behavioral1
Sample
a856bf7c6c74136d039060b62c2fd88d3124621c7cdda77e66f98e3b2f261c13.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a856bf7c6c74136d039060b62c2fd88d3124621c7cdda77e66f98e3b2f261c13.exe
Resource
win10v2004-20221111-en
Target
a856bf7c6c74136d039060b62c2fd88d3124621c7cdda77e66f98e3b2f261c13
Size
20KB
MD5
10b2ff5981d117c07ad423497670856f
SHA1
4388bd93dc002176e0624c5890fd85bec528a5fc
SHA256
a856bf7c6c74136d039060b62c2fd88d3124621c7cdda77e66f98e3b2f261c13
SHA512
d5e60423419e637adc3c3bc97fc5e9fb397531ca97c7d94055aa3704471a7a0c55e69645bc81a42564488905b3ac66e1346877d8216a291d7efb738e467a59ff
SSDEEP
384:eul34EF3IGMIIYQsEN+yN/4xtllahJKDETWus6gRZekW781gW:eud4EGG/Istm6qmZeC1
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FsRtlLookupLastLargeMcbEntry
RtlFindLongestRunClear
CcInitializeCacheMap
ZwQueryInformationProcess
memcpy
ZwDisplayString
ExFreePoolWithTag
KeInsertQueueDpc
IoWritePartitionTableEx
FsRtlInitializeMcb
RtlReserveChunk
READ_REGISTER_BUFFER_ULONG
RtlInt64ToUnicodeString
ExInitializeRundownProtection
ZwCreateFile
RtlAppendUnicodeStringToString
FsRtlIsNtstatusExpected
strlen
DbgPrint
NtDuplicateObject
IoReportResourceForDetection
NtAllocateUuids
KdDebuggerEnabled
FsRtlNotifyFilterChangeDirectory
KeStackAttachProcess
RtlImageNtHeader
IoCreateSymbolicLink
ExAllocatePool
strcmp
CcGetDirtyPages
MmIsAddressValid
CcGetLsnForFileObject
PsRestoreImpersonation
IpizcfAcmvvdWqu
OsvFuvvGhbfDn
GfeKmpxvAbljKm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ