SDDynDll01
SDDynDll02
SDDynDll03
SDDynDll04
SDDynDll05
SDDynDll06
SDDynDll07
SDDynDll08
SDDynDll09
SDDynDll10
SDDynDll11
SDDynDll12
SDDynDll13
SDDynDll14
SDDynDll15
SDDynDll16
SDDynDll17
SDDynDll18
SDDynDll19
SDDynDll20
Static task
static1
Behavioral task
behavioral1
Sample
5eef70070359bbca9882d1584dc2f64bec69e333d45aac83a448cb69afae9f5a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5eef70070359bbca9882d1584dc2f64bec69e333d45aac83a448cb69afae9f5a.dll
Resource
win10v2004-20220812-en
Target
5eef70070359bbca9882d1584dc2f64bec69e333d45aac83a448cb69afae9f5a
Size
512KB
MD5
80d2818f65040ce681483017fbbbb7ca
SHA1
71e8ddc9b5b3268d8ac3ac0c60d09cf70dea9c8c
SHA256
5eef70070359bbca9882d1584dc2f64bec69e333d45aac83a448cb69afae9f5a
SHA512
5051e493c08b0ae31e264895a4df368be36c096f8817129c23b12488ef9c938d012886d65d0492246931ebccb3988c868590a3917892f7ce88832ecffcf99b3d
SSDEEP
12288:HX3Zlqo9Ysskyc4BrzfBUfu1EbwcZY+SaG:33ZP2b44B/BUYcZIaG
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetVersion
VirtualAlloc
GetCurrentProcess
CloseHandle
OpenProcess
WriteProcessMemory
VirtualProtectEx
GetTickCount
ReadFile
GetFileSize
CreateFileA
GetCurrentProcessId
GetFullPathNameA
GetModuleFileNameA
Module32Next
lstrcmpiA
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
lstrcpyA
GetProcAddress
GetModuleHandleA
SetThreadPriority
CreateThread
lstrlenA
SetPriorityClass
CreateSemaphoreA
GetSystemDirectoryA
ReleaseSemaphore
FreeLibrary
LoadLibraryA
Sleep
CreateProcessA
WriteFile
VirtualProtect
DeleteFileA
GetLastError
OpenEventA
ExitProcess
TerminateProcess
GetFileType
GetStdHandle
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
VirtualFree
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
RtlUnwind
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
GetWindowTextA
SendInput
FindWindowA
wsprintfA
SDDynDll01
SDDynDll02
SDDynDll03
SDDynDll04
SDDynDll05
SDDynDll06
SDDynDll07
SDDynDll08
SDDynDll09
SDDynDll10
SDDynDll11
SDDynDll12
SDDynDll13
SDDynDll14
SDDynDll15
SDDynDll16
SDDynDll17
SDDynDll18
SDDynDll19
SDDynDll20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ