DumpAnalyze
DumpAnalyzeEx
Static task
static1
Behavioral task
behavioral1
Sample
sample.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
sample.dll
Resource
win10v2004-20230220-en
Target
b02b8b6c3d517c6b8652b898963068ba12cd360b5cdcf0aad5fe6ff64f0e9920.bin.sample.gz
Size
77KB
MD5
ef5f527025c2a5203e3d108697c29314
SHA1
97e38a7adb217a686f33e5a18b94779f34f0ff06
SHA256
012a3cfaf9916313a3ca238d3cd849561913683bf186be3040bdf1fa9a324bf7
SHA512
0bb90cac36ad0bbab55ef8213505f589085740450817ee06b181f90067d2b21b35603ae32ea5d5a85b493c8aa9b1b38a6ac01690e4328136668014e05fc7a1b9
SSDEEP
1536:u3Slozi7eSRa9euATFdA4IzUhDPlyZ3u0vRk/V9wwGK1Mk9u6lQqdn77K:u3SiOQyVIWPQZ3uIUV9wdUX9u6KqRXK
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
FlushFileBuffers
WriteConsoleW
LoadLibraryW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetFilePointer
WriteFile
CreateFileW
CloseHandle
Sleep
GetProcAddress
LoadLibraryA
GetLastError
VirtualFree
VirtualAlloc
WideCharToMultiByte
MultiByteToWideChar
GetNativeSystemInfo
FreeLibrary
HeapAlloc
HeapFree
GetProcessHeap
IsBadReadPtr
SetLastError
VirtualProtect
GetCurrentThreadId
GetFileType
HeapReAlloc
DecodePointer
GetCommandLineA
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
HeapCreate
HeapDestroy
ExitProcess
GetStdHandle
GetModuleFileNameW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
SetStdHandle
GetConsoleCP
GetConsoleMode
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
RtlUnwind
HeapSize
GetStringTypeW
DumpAnalyze
DumpAnalyzeEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ