CallGetDiskGeometry1
CallReadPhysicalSector1
CallWritePhysicalSector1
attachDll
detachDll
thk_ThunkData32
Static task
static1
Behavioral task
behavioral1
Sample
f7a3e564bd6bdb12238239698eb85e7850aaffe0542af5517fc3a5e1ee93b5c6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7a3e564bd6bdb12238239698eb85e7850aaffe0542af5517fc3a5e1ee93b5c6.dll
Resource
win10v2004-20220812-en
Target
f7a3e564bd6bdb12238239698eb85e7850aaffe0542af5517fc3a5e1ee93b5c6
Size
100KB
MD5
d6ab8d54d9c5987a3f27e36b85091a92
SHA1
9d3883e5407294e1eb12b0846d9f77896cd1c6ce
SHA256
f7a3e564bd6bdb12238239698eb85e7850aaffe0542af5517fc3a5e1ee93b5c6
SHA512
dfa7cccdbd09fd3606cb7670a792a1c8b3b064a2d40553f3e4807b81ef872caa0d6648dba0af19ce6f39c16746ec31083a1997b06c4ff3c4e6302da7ea1a4f19
SSDEEP
1536:tBYiJpqCLGvivovGS0xL7+bZDtU/i55Bta0mzYMMHs9P:tTpNG6vovGS0J0Dci5jtVmzNMHs9P
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WriteFile
SMapLS_IP_EBP_12
SUnMapLS_IP_EBP_12
SMapLS_IP_EBP_16
SUnMapLS_IP_EBP_16
SMapLS_IP_EBP_20
SUnMapLS_IP_EBP_20
ThunkConnect32
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetVersionExA
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
RtlUnwind
CloseHandle
WriteFile
SMapLS_IP_EBP_12
SUnMapLS_IP_EBP_12
SMapLS_IP_EBP_16
SUnMapLS_IP_EBP_16
SMapLS_IP_EBP_20
SUnMapLS_IP_EBP_20
ThunkConnect32
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetVersionExA
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
RtlUnwind
CloseHandle
CallGetDiskGeometry1
CallReadPhysicalSector1
CallWritePhysicalSector1
attachDll
detachDll
thk_ThunkData32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ