__ZwAllocateVirtualMemory@4
__ZwFreeVirtualMemory@8
__ZwWaitForSingleObject@4
Static task
static1
Behavioral task
behavioral1
Sample
c2e52340326696bd72014bd653b298fd12e5dfc521191ebe2f722c4ad2c3a4ab.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2e52340326696bd72014bd653b298fd12e5dfc521191ebe2f722c4ad2c3a4ab.dll
Resource
win10v2004-20220812-en
Target
c2e52340326696bd72014bd653b298fd12e5dfc521191ebe2f722c4ad2c3a4ab
Size
28KB
MD5
0355ef086123beb952b9e4d2880434f7
SHA1
61a0055e331f5ada5dc2e39292fa39278e67edcd
SHA256
c2e52340326696bd72014bd653b298fd12e5dfc521191ebe2f722c4ad2c3a4ab
SHA512
6c444ac11a199bf556287597494fb842ac7d2f2650c9fc27912ddaa49717eb6be81fcd62167a5d81556f41adba3116823310eddc01b095364408ff4a37c7354d
SSDEEP
768:06ngNc4/zHY/ZfNshsFWeLaKBHbhZ//tAQqFDf9:06y7/+lGKROQqxV
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
MmUnmapLockedPages
MmProtectMdlSystemAddress
MmAddVerifierThunks
MmAllocateMappingAddress
MmAdvanceMdl
ZwFsControlFile
RtlIntegerToUnicodeString
RtlCheckRegistryKey
_strupr
__ZwAllocateVirtualMemory@4
__ZwFreeVirtualMemory@8
__ZwWaitForSingleObject@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ