WinDllChangeSHIMColorspace
WinDllSHIMChunk
WinDllSHIMClose
WinDllSHIMOpen
Static task
static1
Behavioral task
behavioral1
Sample
8d0afbaf2b2a4f38cfbcd8713e00a29834fc78db52e70700b6364455fe5e0c41.dll
Resource
win7-20220812-en
Target
8d0afbaf2b2a4f38cfbcd8713e00a29834fc78db52e70700b6364455fe5e0c41
Size
362KB
MD5
3a5ed5040fbc0689c71bd77ee487a930
SHA1
db01ecf015a5f7a3854b962333d56567e834c46f
SHA256
8d0afbaf2b2a4f38cfbcd8713e00a29834fc78db52e70700b6364455fe5e0c41
SHA512
82ed386efb85c849e8301a8b3a1869cc8824e36ee5fa786cef125aeb9d31ed5da3495987a51325c313e6c05ca7b11a30c99bec3f989a44ec27423f26eae767d1
SSDEEP
6144:wnhSuWW4swvDDQvZGUeaphY3N8IXm/WW9uYEvSSoQOBusfpItGj876PI:wnAxW4vbMvZG4Y3NJWuW9XiSSKusfpIO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MultiByteToWideChar
HeapFree
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetCurrentThread
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
FatalAppExitA
VirtualAlloc
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
RtlUnwind
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
UnhandledExceptionFilter
InterlockedDecrement
InterlockedIncrement
SetFilePointer
LoadLibraryA
SetConsoleCtrlHandler
GetStringTypeA
GetStringTypeW
Sleep
LCMapStringA
LCMapStringW
SetStdHandle
IsValidLocale
IsValidCodePage
GetUserDefaultLCID
FlushFileBuffers
GetLocaleInfoA
GetLocaleInfoW
CloseHandle
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
HeapReAlloc
ReadFile
HeapSize
WinDllChangeSHIMColorspace
WinDllSHIMChunk
WinDllSHIMClose
WinDllSHIMOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE