DllMain
fltDeletePage
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
3ca2c8cd17025822bb8b9c41b19b6a9fc427a5f38ad4cada58c40bde5347cbb1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ca2c8cd17025822bb8b9c41b19b6a9fc427a5f38ad4cada58c40bde5347cbb1.dll
Resource
win10v2004-20220812-en
Target
3ca2c8cd17025822bb8b9c41b19b6a9fc427a5f38ad4cada58c40bde5347cbb1
Size
239KB
MD5
64ba0d548b55510af0738ecffaf0f361
SHA1
89462c52baa926b6f057e8543bbe7e252cbe9320
SHA256
3ca2c8cd17025822bb8b9c41b19b6a9fc427a5f38ad4cada58c40bde5347cbb1
SHA512
69b3acc156b0f89f2a49d4531968e01688cf35985816b2364206ba56569581ba894f2422f5129b9c8e0b06d5601606e5654ee315b00a8392933bf00be8d01cf7
SSDEEP
6144:rHft+g0QPekyswLCwuSr08hKZFXZoMq3Z:Lfh0igTx9nXMOZ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
SetStdHandle
CloseHandle
SetFilePointer
LoadLibraryA
FlushFileBuffers
WideCharToMultiByte
GetEnvironmentStringsW
HeapFree
HeapAlloc
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
TerminateProcess
lstrcpyA
GetStdHandle
WriteFile
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetFileType
GetOEMCP
GetStartupInfoA
GetModuleFileNameA
GetCPInfo
GetACP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
ord163
ord162
ord169
ord221
ord190
ord192
ord191
ord189
ord188
DllMain
fltDeletePage
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE