DllInit
Game
Static task
static1
Behavioral task
behavioral1
Sample
DCF43AACE0E64EC84E5243259A0982DD.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DCF43AACE0E64EC84E5243259A0982DD.dll
Resource
win10v2004-20220812-en
Target
DCF43AACE0E64EC84E5243259A0982DD.fil
Size
197KB
MD5
dcf43aace0e64ec84e5243259a0982dd
SHA1
176300f78e311c67b11cb72d30604bc3ee5ded04
SHA256
b2e45cd6788c1f77ad7d91372f80ed9fb9d2552810d4ddd7b81ab3ae682e3980
SHA512
4b79dd0c14449dd14ba2b23f89d9928b7ac469b2d58a2cbaeb0094fa0c5cebc418d47a99800db41a016a004f0267c14ba4384a94e0f50706a0c835c3b698e11a
SSDEEP
3072:UuVdovIMUoDgZBmQ/3BWTBfXJO9gKAu/YVEqAMI5MSaNoajixQvUZ3CaakNS92Vl:TACBf/3BWTBBoYVEzMVSGoajuQ4LVE1
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SetLastError
HeapFree
lstrcpyA
HeapAlloc
WideCharToMultiByte
lstrlenW
VirtualFree
CloseHandle
WriteFile
ReadFile
CreateFileA
VirtualAlloc
CopyFileA
lstrcmpiA
MultiByteToWideChar
GetModuleHandleA
lstrcatA
lstrlenA
SetFilePointer
CreateEventA
GetCurrentProcessId
ReadProcessMemory
VirtualQueryEx
TerminateProcess
SetThreadContext
WriteProcessMemory
VirtualAllocEx
GetThreadContext
GetLastError
CreateProcessW
GetProcAddress
lstrcmpA
VirtualProtect
lstrcpyW
lstrcmpiW
ExitProcess
LoadLibraryA
FreeLibrary
HeapDestroy
CreateDirectoryA
GetTempPathA
GetModuleFileNameA
HeapCreate
SetEnvironmentVariableA
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentThreadId
GetTickCount
WaitForSingleObject
CompareFileTime
GetProcessTimes
GetCurrentProcess
GetFileTime
GetFileSize
GetFileAttributesA
GetFileAttributesW
CreateFileW
OpenEventA
ExitThread
SetEvent
WaitForMultipleObjects
CreateThread
GetProcessHeap
CharLowerA
wsprintfA
MessageBoxA
SetWindowLongA
DispatchMessageA
GetMessageA
PostMessageA
KillTimer
DefWindowProcA
SendMessageA
GetWindowLongA
UnregisterClassA
DestroyWindow
CreateWindowExA
RegisterClassExA
SetTimer
DllInit
Game
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ