?R0_CloseFile@@YAHPAXPAG@Z
?R0_GetFileSize@@YAKPAXPAG@Z
?R0_OpenCreateFile@@YAPAXHPADKKKKPAGPAE@Z
?R0_ReadFile@@YAKHPAX0KKPAG@Z
?R0_WriteFile@@YAKHPAX0KKPAG@Z
Static task
static1
Behavioral task
behavioral1
Sample
187b6479bd23cff85e4d4be1c57015245cf1cc75ba129dbe76964c8f34a7c9f9.dll
Resource
win7-20220812-en
Target
187b6479bd23cff85e4d4be1c57015245cf1cc75ba129dbe76964c8f34a7c9f9
Size
188KB
MD5
91f447560f9966e78505159b6af38c51
SHA1
438beebd7b889d9d3a99e31ee6bc583dd5e3cea3
SHA256
187b6479bd23cff85e4d4be1c57015245cf1cc75ba129dbe76964c8f34a7c9f9
SHA512
b332fea3c8f2fa27c3fbfeaff6d988a50b4edae8fee52f34817228d04374e45936926f08889474940ee2744d93e82fba3f22d07c60d99b803c76c6113fdc16cd
SSDEEP
3072:Pa8+oQjjTzKgFREFBB5MjtWvGYcKN9BUzMOmEnNGNk8GmwEGYKY9F/G4f:PSPz9FREFBB54WvTcKuYENn86tYfGc
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeEnvironmentStringsW
CreateFileA
SetLastError
CloseHandle
ReadFile
SetFilePointer
WriteFile
GetFileSize
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetLastError
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
RtlUnwind
?R0_CloseFile@@YAHPAXPAG@Z
?R0_GetFileSize@@YAKPAXPAG@Z
?R0_OpenCreateFile@@YAPAXHPADKKKKPAGPAE@Z
?R0_ReadFile@@YAKHPAX0KKPAG@Z
?R0_WriteFile@@YAKHPAX0KKPAG@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE