DllMain
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
ca2addf2469efdadfa422e4e99fc615c62fee499f93026d4c7fa8051eef4ef2c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca2addf2469efdadfa422e4e99fc615c62fee499f93026d4c7fa8051eef4ef2c.dll
Resource
win10v2004-20220812-en
Target
ca2addf2469efdadfa422e4e99fc615c62fee499f93026d4c7fa8051eef4ef2c
Size
234KB
MD5
3a3cb5685457a1093ec26ae71bdb94e1
SHA1
b51368319eef9e4c5b539e1377139f6f3ae3a7da
SHA256
ca2addf2469efdadfa422e4e99fc615c62fee499f93026d4c7fa8051eef4ef2c
SHA512
9d9f2cf7f7175c946968fdaffd6183560625055017216797c9c77edd7a97e9e3d4393e093d49b32253a4b234be0e18a5d51f6d32fcfdbb742b18fadd24f91064
SSDEEP
6144:9Lurt+g0QPekyswLCwuSr08hKZFXZoMq3B:crh0igTx9nXMOB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualAlloc
LoadLibraryA
FreeLibrary
MultiByteToWideChar
lstrcpyA
OpenFile
TlsSetValue
GetCurrentThreadId
SetFilePointer
SetStdHandle
CloseHandle
FlushFileBuffers
WriteFile
HeapFree
HeapAlloc
GetCommandLineA
GetModuleHandleA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
GetStdHandle
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetFileType
GetOEMCP
GetStartupInfoA
GetModuleFileNameA
GetCPInfo
GetACP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
wsprintfA
StgOpenStorage
ord135
ord134
ord163
DllMain
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE