DllMain
fltDeletePage
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
89b1ef9f329a7af7aeb4ae4020682260481abddc96f583df56b2c67f2b89488d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
89b1ef9f329a7af7aeb4ae4020682260481abddc96f583df56b2c67f2b89488d.dll
Resource
win10v2004-20220812-en
Target
89b1ef9f329a7af7aeb4ae4020682260481abddc96f583df56b2c67f2b89488d
Size
199KB
MD5
0f67f987d161087687850ed9b7c82249
SHA1
22defbadf162b2cf0fae90558090af03738476a0
SHA256
89b1ef9f329a7af7aeb4ae4020682260481abddc96f583df56b2c67f2b89488d
SHA512
f9b2efd090e61e70809047f5174fd0485c008010f3756cb50626107376c91c876bc2dc20b646470869f73f03b1805fb8916700aa018b926826d7c147a20670ed
SSDEEP
6144:TYabYrr5+VGkDtG2bi4fhLxfzmxQB0dNY:TJit+VvDE2bi4fhLxSY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetLastError
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
HeapDestroy
SetFilePointer
SetStdHandle
CloseHandle
FlushFileBuffers
LoadLibraryA
VirtualAlloc
HeapFree
HeapAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WriteFile
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
lstrcpyA
GetLastError
FreeEnvironmentStringsA
GetStartupInfoA
HeapCreate
VirtualFree
SetHandleCount
GetFileType
GetStdHandle
DeleteCriticalSection
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
ord201
ord175
ord129
ord192
ord116
ord123
ord189
ord188
ord134
ord174
ord101
ord131
ord163
ord100
ord137
ord141
ord125
ord179
ord191
ord190
DllMain
fltDeletePage
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE