ClbAddData
GIAEJJPK
ClbSetColumnWidths
ILNPMLYY
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
80f44c67d24d9b6d817a9c0240a0bc26ef75bc8df3749871ffb47a9b3d777ff4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80f44c67d24d9b6d817a9c0240a0bc26ef75bc8df3749871ffb47a9b3d777ff4.dll
Resource
win10v2004-20220812-en
Target
80f44c67d24d9b6d817a9c0240a0bc26ef75bc8df3749871ffb47a9b3d777ff4
Size
45KB
MD5
91ef06a3ff5cf1752a63ceac631498f7
SHA1
8aaa2942b680ca8890c84b0d22d88c98199cc738
SHA256
80f44c67d24d9b6d817a9c0240a0bc26ef75bc8df3749871ffb47a9b3d777ff4
SHA512
82c8f4e5f7a95de39132dcd104087cde40703db45dccefd48aaed64e59b4ac0c302c79487f2a7c0f691a5b43f414ade9699939d5e3b9522e71de4cdf506ff43f
SSDEEP
768:DjNV9fYopbUVHmgOMtitTjxyNq5ewMwkjw5I9tGYADjMl6t:DBrYo9UC4WTQNqNfkjw2G8l
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
RtlUnwind
GetCommandLineA
GetVersion
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
ClbAddData
GIAEJJPK
ClbSetColumnWidths
ILNPMLYY
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ