kLdKp
bEPWYgeAX
jqPGf
Static task
static1
Behavioral task
behavioral1
Sample
ccb8e17d3df37549a3dbdb31f3b5e03b8fbb3ddf9462cf962518c8e0312cdb56.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ccb8e17d3df37549a3dbdb31f3b5e03b8fbb3ddf9462cf962518c8e0312cdb56.dll
Resource
win10v2004-en-20220113
Target
ccb8e17d3df37549a3dbdb31f3b5e03b8fbb3ddf9462cf962518c8e0312cdb56
Size
246KB
MD5
d871aee05301c265725e006800294894
SHA1
3b6d944433e24d2eb9606f8d4bfc882ba505c4d6
SHA256
ccb8e17d3df37549a3dbdb31f3b5e03b8fbb3ddf9462cf962518c8e0312cdb56
SHA512
83508d1a3e08a584e0fa4b7b7f3dc87ee4bce48eea83e6d009baf92041bd3ce8eb6ee6132f768fcd54168c1c7b845e1ef62e537471a2f3a323b79c3e0858ecc5
SSDEEP
6144:B/akcoqnPjzNCqW9aPbDROP0ZMSfFX+UlkF2gb2ojwW:BLaPjz0MIiOUWM2b8
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TlsAlloc
LeaveCriticalSection
LCMapStringA
VirtualProtectEx
HeapCreate
FreeEnvironmentStringsA
GetConsoleCP
VirtualFree
GetCommandLineA
DeleteCriticalSection
GetStdHandle
SetFilePointer
LCMapStringW
GetConsoleMode
QueryPerformanceCounter
IsDebuggerPresent
Sleep
FreeEnvironmentStringsW
GetTickCount
WideCharToMultiByte
WriteConsoleW
TlsFree
GetLastError
CreateFileA
GetProcAddress
GetCurrentProcess
GetCurrentProcessId
GetModuleHandleA
GetVersionExA
GetEnvironmentStringsW
CloseHandle
GetProcessHeap
HeapSize
GetCPInfo
GetCurrentThreadId
IsValidCodePage
GetConsoleOutputCP
FlushFileBuffers
SetLastError
InterlockedIncrement
GetStringTypeW
MultiByteToWideChar
TerminateProcess
GetStartupInfoA
VirtualAlloc
EnterCriticalSection
UnhandledExceptionFilter
GetModuleFileNameA
ExitProcess
SetStdHandle
LoadLibraryA
HeapDestroy
WriteConsoleA
TlsGetValue
HeapFree
GetEnvironmentStrings
TlsSetValue
HeapAlloc
GetACP
RtlUnwind
WriteFile
GetOEMCP
GetSystemTimeAsFileTime
HeapReAlloc
SetUnhandledExceptionFilter
GetLocaleInfoA
GetStringTypeA
GetFileType
InterlockedDecrement
SetHandleCount
InitializeCriticalSection
kLdKp
bEPWYgeAX
jqPGf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ