DllMain
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
f50c5f4e69ec5bec7e38164003ea69baa28349eda052c7874b4a5cb363838535.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f50c5f4e69ec5bec7e38164003ea69baa28349eda052c7874b4a5cb363838535.dll
Resource
win10v2004-20220812-en
Target
f50c5f4e69ec5bec7e38164003ea69baa28349eda052c7874b4a5cb363838535
Size
131KB
MD5
63a1a6d7efb59220ee6c639d55d7e0a0
SHA1
f0c33946c89fb858b3b1af390491b3add5586e9c
SHA256
f50c5f4e69ec5bec7e38164003ea69baa28349eda052c7874b4a5cb363838535
SHA512
c2db5a49aadb68e6733a363c92dc5fc6e08447d1f397982c481707362971db583b6275d024f12f5c53c4ad27699f335126efd27e1f56efdfbe4b7a6734bf0d04
SSDEEP
3072:yO8gkcDjg2q6JJA93C0t5Yz8oZdZ/uLQX2/GLe7OrIGVZ:yO8KDfJA93COezxZdZX2+jUGn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetHandleCount
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetModuleFileNameA
GetCPInfo
SetStdHandle
CloseHandle
SetFilePointer
LoadLibraryA
GetProcAddress
FlushFileBuffers
GetStringTypeW
GetStringTypeA
VirtualAlloc
LCMapStringA
HeapFree
LCMapStringW
HeapAlloc
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
SetLastError
GetLastError
GlobalFree
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetEnvironmentStringsW
WideCharToMultiByte
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
VirtualFree
HeapDestroy
HeapCreate
EnterCriticalSection
WriteFile
InitializeCriticalSection
LeaveCriticalSection
ord221
ord192
ord283
ord285
ord134
ord188
ord312
ord116
ord189
ord190
ord191
ord129
ord125
ord201
DllMain
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ