?RtlDirectoryExW@@YGPADHPAG<V
?DeleteVersionExW@@YGGD<V
?FindSectionA@@YGFFPA_NGM<V
?ModifyPathExW@@YGKK<V
?SetFilePathW@@YGIPAJJIPAJ<V
?IsNotFileEx@@YGMPAMDF<V
Static task
static1
Behavioral task
behavioral1
Sample
c5cc0a1f78174f3c65cb7adab847c375cf43aa939407b0d31ce7217303eb16fc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5cc0a1f78174f3c65cb7adab847c375cf43aa939407b0d31ce7217303eb16fc.dll
Resource
win10v2004-20220812-en
Target
c5cc0a1f78174f3c65cb7adab847c375cf43aa939407b0d31ce7217303eb16fc
Size
106KB
MD5
adac0644934bdc8911354c338a69a2b8
SHA1
9a522e48da1c68600057c50222019e7ec6fe8fec
SHA256
c5cc0a1f78174f3c65cb7adab847c375cf43aa939407b0d31ce7217303eb16fc
SHA512
e6508406973befcd26c42d20206d3cd178ea219a63d8d822afc9009fc1a5753fba431dcd324a7dd78bf7bb5a6f7e331fe8251a07133e2f1bf48315693e2b62ad
SSDEEP
1536:3p8fbfFCfZLnwVtMieVavpnBihoy1DYoZTKeSUS4uqajZm/y:Z8DMfZjwjMipnBiZlRpSUmjZJ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IoDeleteSymbolicLink
MmForceSectionClosed
RtlFreeUnicodeString
KeEnterCriticalRegion
KeLeaveCriticalRegion
RtlDeleteElementGenericTable
ZwSetSecurityObject
KdDisableDebugger
IoGetDeviceToVerify
IoCheckEaBufferValidity
CcFastCopyRead
HalExamineMBR
RtlFindClearBitsAndSet
ProbeForRead
IoDeviceObjectType
KeGetCurrentThread
ObInsertObject
IoSetShareAccess
RtlCreateSecurityDescriptor
MmIsThisAnNtAsSystem
RtlFindClearBits
KeInitializeTimer
IoQueueWorkItem
ZwDeleteKey
RtlQueryRegistryValues
IoGetTopLevelIrp
IoInvalidateDeviceRelations
FsRtlCheckLockForReadAccess
ExUnregisterCallback
IoReleaseCancelSpinLock
IoGetBootDiskInformation
KeRestoreFloatingPointState
SeTokenIsRestricted
IoSetTopLevelIrp
ObGetObjectSecurity
PoUnregisterSystemState
IoGetDeviceAttachmentBaseRef
KeQueryInterruptTime
KeTickCount
PsDereferencePrimaryToken
IoGetDiskDeviceObject
MmFreeNonCachedMemory
IoCheckShareAccess
MmFreeMappingAddress
MmHighestUserAddress
IoVerifyVolume
ZwQuerySymbolicLinkObject
RtlAnsiStringToUnicodeString
CcPinMappedData
ExSystemTimeToLocalTime
DbgBreakPointWithStatus
KeReadStateMutex
KeInitializeEvent
ExGetExclusiveWaiterCount
?RtlDirectoryExW@@YGPADHPAG<V
?DeleteVersionExW@@YGGD<V
?FindSectionA@@YGFFPA_NGM<V
?ModifyPathExW@@YGKK<V
?SetFilePathW@@YGIPAJJIPAJ<V
?IsNotFileEx@@YGMPAMDF<V
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE