?rundll@@YGXPAUHWND__@@PAUHINSTANCE__@@PBDH@Z
rundll32
Static task
static1
Behavioral task
behavioral1
Sample
ef68aa16cea57f8000dd1db81bd78774fd6e7c0847b1fb922df00003cd205e54.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef68aa16cea57f8000dd1db81bd78774fd6e7c0847b1fb922df00003cd205e54.dll
Resource
win10v2004-20220812-en
Target
ef68aa16cea57f8000dd1db81bd78774fd6e7c0847b1fb922df00003cd205e54
Size
3KB
MD5
7758a4da7de22f72d3c4acfb9c6dd5a0
SHA1
19f6069a757c1568407928d1925d3676a975d05d
SHA256
ef68aa16cea57f8000dd1db81bd78774fd6e7c0847b1fb922df00003cd205e54
SHA512
c72c064c41ab9e0be985d77a7cdb560806293cd4aab7cfe3c718f27e45610e8b15b61673e1bfda24fd1f550c579381cbd1ff442f50482331889a0f8d80cc0814
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
?rundll@@YGXPAUHWND__@@PAUHINSTANCE__@@PBDH@Z
rundll32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ