DmmZrSYRVnSdBKIAy
LAbOKuYMBnEKJatAR
OlavanKupin
ReuleOfFiv
SearchSolution
lsbwwSECohogDsjsC
Static task
static1
Behavioral task
behavioral1
Sample
geg.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
geg.dll
Resource
win10v2004-20220901-en
Target
geg.dll
Size
299KB
MD5
e03a20cb5e94f4dd46ccdff15699d65b
SHA1
144b5aec464ad625db98b648e71adf15d25ed90c
SHA256
bc57f82267ee65e6639b223a57eed33b6980e00fd8138aae9001b17b3a014ce0
SHA512
d5f5587bcf955dbc467d685434659fb04733671b1e6f0662bd7e6cf89de3bd4ce2cc1d47c6bdb808f7eb613a282bedce81279d81f6e19f022b5a8c2f821e6ad1
SSDEEP
6144:DCwRY6BW3aLjd5b+94uxYc9tN48VuCyn7:mUB8avfJi5VuJ
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetNumaHighestNodeNumber
ReadFile
OpenEventA
EnumLanguageGroupLocalesW
SizeofResource
QueryDosDeviceW
CreateFileMappingNumaA
SetConsoleCtrlHandler
EnumTimeFormatsW
SetThreadLocale
HeapCreate
ReplaceFileA
VirtualProtect
HeapFree
GetCommProperties
GetCommandLineW
GetHandleInformation
WriteFile
DeviceIoControl
GetDriveTypeA
GetUserDefaultLangID
OpenPrivateNamespaceW
GetCommModemStatus
IsEnclaveTypeSupported
EnumCalendarInfoA
SetFilePointer
GetCompressedFileSizeW
EnumResourceNamesW
FindFirstVolumeA
lstrlenA
GetVolumeInformationA
WaitForSingleObject
LocalAlloc
SetComputerNameExW
UnregisterApplicationRecoveryCallback
CreateActCtxA
SetUserGeoName
ResumeThread
GlobalGetAtomNameW
CommConfigDialogA
RemoveSecureMemoryCacheCallback
ResolveLocaleName
Sleep
GetFileInformationByHandle
BuildCommDCBAndTimeoutsW
EnumUILanguagesA
GlobalAddAtomA
CompareStringA
GetLastError
OpenMutexA
GetBinaryTypeA
GetMaximumProcessorGroupCount
GetStringTypeExA
MoveFileExA
SetMessageWaitingIndicator
EnumResourceNamesExA
CreateFileA
SetDllDirectoryA
EnumDateFormatsExEx
TlsAlloc
CloseHandle
CompareStringEx
GetNumberFormatW
EnumResourceLanguagesW
CreateSymbolicLinkTransactedW
WritePrivateProfileStringA
ResetEvent
GetActiveProcessorCount
HeapAlloc
GetCurrentDirectoryW
GetCurrentConsoleFontEx
SwitchToThread
MoveFileWithProgressA
CreateJobObjectA
GetFileSize
FindFirstStreamW
GetProcessHeap
GetNumaProximityNode
GlobalUnfix
GetProcessInformation
lstrcmpiA
LocalReAlloc
TerminateJobObject
GetThreadGroupAffinity
GetSystemRegistryQuota
FindNextStreamW
SetDllDirectoryW
MoveFileW
GetProfileStringA
GetProcessTimes
GetFileTime
FlushFileBuffers
WriteConsoleW
CreateFileW
DecodePointer
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
SetStdHandle
HeapReAlloc
HeapSize
GetStringTypeW
GetFileType
GetStdHandle
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WaitForInputIdle
RegisterClassExW
GetWindowPlacement
GetClassInfoW
ExitWindowsEx
QueryDisplayConfig
GetPointerInputTransform
GetWindowDpiHostingBehavior
DrawStateW
CharToOemBuffA
CancelShutdown
EnumPropsW
RegisterClassA
RegisterClipboardFormatA
GetClipboardData
GetDisplayConfigBufferSizes
SendDlgItemMessageA
ScrollWindowEx
DisplayConfigSetDeviceInfo
DisplayConfigGetDeviceInfo
LookupIconIdFromDirectoryEx
SetProcessDPIAware
RegisterPointerInputTarget
DrawFrameControl
CharNextExA
GetRawPointerDeviceData
TranslateAcceleratorW
DmmZrSYRVnSdBKIAy
LAbOKuYMBnEKJatAR
OlavanKupin
ReuleOfFiv
SearchSolution
lsbwwSECohogDsjsC
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ