UalInstrument
UalStart
UalStop
Static task
static1
Behavioral task
behavioral1
Sample
4b0c1e0923be8bf6694a131c641758e0910f662f07bd45cd5c22532a3b8e9f65.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4b0c1e0923be8bf6694a131c641758e0910f662f07bd45cd5c22532a3b8e9f65.dll
Resource
win10v2004-20230220-en
Target
4b0c1e0923be8bf6694a131c641758e0910f662f07bd45cd5c22532a3b8e9f65
Size
545KB
MD5
aad41441ce6dead8c634a3330be56fb4
SHA1
45bbbcb083855d06f8b851ff64dc3fc40140b374
SHA256
4b0c1e0923be8bf6694a131c641758e0910f662f07bd45cd5c22532a3b8e9f65
SHA512
70559562812170fceb040de706596fb9fb9450f465b63baccf55ed42c6bab6416517572eb0c71a7c13cfeb06a75441e08da52068a3cf072b4dd133fdcab4a472
SSDEEP
12288:L+oOvlogan6QhzZQ+8WXwWsgooPO2/hSMXliphqet+:L0+6Qb6NWsgXPO2/hSMXlIhk
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
MultiByteToWideChar
GetCurrentThread
SetLastError
TerminateProcess
ResumeThread
GetLastError
CloseHandle
ExitProcess
VirtualProtect
VirtualFree
GetCurrentProcess
VirtualAlloc
GetCurrentThreadId
SuspendThread
GetThreadContext
FlushInstructionCache
SetThreadContext
VirtualQuery
WriteFile
UnmapViewOfFile
GetProcAddress
GetModuleHandleW
FreeLibrary
LoadLibraryExW
WriteConsoleW
CreateFileW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedFlushSList
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetModuleFileNameW
HeapAlloc
HeapFree
GetStdHandle
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetFilePointerEx
SetStdHandle
HeapSize
FlushFileBuffers
GetConsoleCP
GetConsoleMode
InetPtonW
GetAddrInfoExW
UalInstrument
UalStart
UalStop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ