_PostQuitMessagePostQuitMessagePostQuitMessagePostQuitMessage@0
Static task
static1
Behavioral task
behavioral1
Sample
d9f2f21f5ba4ca783ef5e4e98cb2948ce5a305bd8c8977edb9b81527c2de2dde.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d9f2f21f5ba4ca783ef5e4e98cb2948ce5a305bd8c8977edb9b81527c2de2dde.dll
Resource
win10v2004-20220812-en
General
-
Target
d9f2f21f5ba4ca783ef5e4e98cb2948ce5a305bd8c8977edb9b81527c2de2dde
-
Size
194KB
-
MD5
3aa47e8f9d4bb4c591bca84e1f7a3bd0
-
SHA1
d9fa19d59e77aa1f590c547db4905c0aac2ab447
-
SHA256
d9f2f21f5ba4ca783ef5e4e98cb2948ce5a305bd8c8977edb9b81527c2de2dde
-
SHA512
dd4147a5e755460f2e6ff33ee01ec6be59f00a3af7ffe659b11f5faaf04f435d9ec3df6d9cf6dba3488018cbb9355a56ab5572aa6e216bbebcbe3f07c71c41bc
-
SSDEEP
6144:8/cCLtoCfVu1H4I+rcNnw7jr8wg6TCTi6IzG:8H3VgH4I+Ihw7jr8wg6TCTi6IzG
Malware Config
Signatures
Files
-
d9f2f21f5ba4ca783ef5e4e98cb2948ce5a305bd8c8977edb9b81527c2de2dde.dll windows x86
8fe07495a96eaa712b378d71118e5e3a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExW
SearchPathW
lstrlenA
WaitCommEvent
GetSystemDefaultUILanguage
FindNextFileA
VirtualFree
GlobalGetAtomNameA
CreateEventA
ole32
CoBuildVersion
OleBuildVersion
shlwapi
PathFileExistsA
Exports
Exports
Sections
.cfvgg Size: 512B - Virtual size: 430B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vgfdg Size: 512B - Virtual size: 129B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.erre Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dfrer Size: 1024B - Virtual size: 606B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ