ProcessFuncM
ProcessFuncS
Static task
static1
Behavioral task
behavioral1
Sample
b6cf992784588356b5db18eb6398c0e280222f81203509de8b6ef5c0d8573e6d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b6cf992784588356b5db18eb6398c0e280222f81203509de8b6ef5c0d8573e6d.dll
Resource
win10v2004-20220901-en
Target
b6cf992784588356b5db18eb6398c0e280222f81203509de8b6ef5c0d8573e6d
Size
144KB
MD5
a0e5fff01ec1673883b09a6b5670ef10
SHA1
4e09072e85c4381e270a31e3c6123e97a697e053
SHA256
b6cf992784588356b5db18eb6398c0e280222f81203509de8b6ef5c0d8573e6d
SHA512
8cc46385bd5d537bd41feb36cb5427c25d8fe70020e307d7f3707d22999ab7870c57365558e3f55f267ac5c988429961b30020226614ddc3f46da8b549950f79
SSDEEP
3072:Dcjns6PtT96pHwK/a6Pfhr0Ph1xIs0KLa:qd9X6nSPvxIsw
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
ProcessFuncM
ProcessFuncS
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE