?RtlDirectoryExW@@YGPADHPAG<V
?DeleteVersionExW@@YGGD<V
?FindSectionA@@YGFFPA_NGM<V
?ModifyPathExW@@YGKK<V
?SetFilePathW@@YGIPAJJIPAJ<V
?IsNotFileEx@@YGMPAMDF<V
Static task
static1
Behavioral task
behavioral1
Sample
bfd30b80adb768eb0767136eed1c01717d10bc816b1f728e9315a5120afeafa1.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bfd30b80adb768eb0767136eed1c01717d10bc816b1f728e9315a5120afeafa1.dll
Resource
win10v2004-20220901-en
Target
bfd30b80adb768eb0767136eed1c01717d10bc816b1f728e9315a5120afeafa1
Size
288KB
MD5
622ecef1ec86215eeed41709a84c0473
SHA1
553574b6368e76a13ae44d6cc05ab29990311c4e
SHA256
bfd30b80adb768eb0767136eed1c01717d10bc816b1f728e9315a5120afeafa1
SHA512
9e94223ff64c11f25ebfcf63b3934ce4ee74ad621f148f969edff7cc6165a695bb7d75937834cc7850cc1f528d6b2177f501fe25529f74abb2cb90b0b9a08e21
SSDEEP
6144:WDMhjIMO7fvuvg4PfMx8lW9Jj8oQXrcLPp/oiKGVD7cATnoPta+p7GV31Gzrr/gj:WDMpO7HF4WBo8noFa+p8t7
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IoDeleteSymbolicLink
MmForceSectionClosed
RtlFreeUnicodeString
KeEnterCriticalRegion
KeLeaveCriticalRegion
RtlDeleteElementGenericTable
ZwSetSecurityObject
KdDisableDebugger
IoGetDeviceToVerify
IoCheckEaBufferValidity
CcFastCopyRead
HalExamineMBR
RtlFindClearBitsAndSet
ProbeForRead
IoDeviceObjectType
KeGetCurrentThread
ObInsertObject
IoSetShareAccess
RtlCreateSecurityDescriptor
MmIsThisAnNtAsSystem
RtlFindClearBits
KeInitializeTimer
IoQueueWorkItem
ZwDeleteKey
RtlQueryRegistryValues
IoGetTopLevelIrp
IoInvalidateDeviceRelations
FsRtlCheckLockForReadAccess
ExUnregisterCallback
IoReleaseCancelSpinLock
IoGetBootDiskInformation
KeRestoreFloatingPointState
SeTokenIsRestricted
IoSetTopLevelIrp
ObGetObjectSecurity
PoUnregisterSystemState
IoGetDeviceAttachmentBaseRef
KeQueryInterruptTime
KeTickCount
PsDereferencePrimaryToken
IoGetDiskDeviceObject
MmFreeNonCachedMemory
IoCheckShareAccess
MmFreeMappingAddress
MmHighestUserAddress
IoVerifyVolume
ZwQuerySymbolicLinkObject
RtlAnsiStringToUnicodeString
CcPinMappedData
ExSystemTimeToLocalTime
DbgBreakPointWithStatus
KeReadStateMutex
KeInitializeEvent
ExGetExclusiveWaiterCount
?RtlDirectoryExW@@YGPADHPAG<V
?DeleteVersionExW@@YGGD<V
?FindSectionA@@YGFFPA_NGM<V
?ModifyPathExW@@YGKK<V
?SetFilePathW@@YGIPAJJIPAJ<V
?IsNotFileEx@@YGMPAMDF<V
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE