Ox12121212
Ox12345678
_DllMain@12
Static task
static1
Behavioral task
behavioral1
Sample
d67c88099b89ce5cca8d3a2d7ff58dbbac2d7f0ecadf697e88be8daeec4081ea.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d67c88099b89ce5cca8d3a2d7ff58dbbac2d7f0ecadf697e88be8daeec4081ea.dll
Resource
win10v2004-20220812-en
Target
d67c88099b89ce5cca8d3a2d7ff58dbbac2d7f0ecadf697e88be8daeec4081ea
Size
936KB
MD5
215e06dfe86f2eb3906e46bd21e3e125
SHA1
1de9bf189c75067a927f624d4bb0a8084f9df3f1
SHA256
d67c88099b89ce5cca8d3a2d7ff58dbbac2d7f0ecadf697e88be8daeec4081ea
SHA512
dd9f20dc865c8e1da48e38e80a2b012e60f49d6d89762a086e250109b857e5fbadbc9bc32f27374520d28e16aacffb49e968388b5b5d57a00e760e22c4a3e722
SSDEEP
24576:e8YoYd3WoXOuFrQZWkIP0biLhyBwKH82fpcx:03xXOu9kIP0bNwKH8ypcx
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReadFile
SetFilePointer
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetFileSize
CopyFileA
ExitProcess
Sleep
WaitForSingleObject
CreateThread
OpenProcess
ReleaseMutex
SetEvent
GetHandleInformation
CreateEventA
CreateMutexA
TerminateProcess
CreateProcessA
OpenFileMappingA
HeapDestroy
WriteFile
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetTickCount
OpenEventA
OpenMutexA
WaitForMultipleObjects
DeviceIoControl
ReadProcessMemory
VirtualProtect
WriteProcessMemory
GetCurrentThreadId
GetCurrentProcessId
GetModuleHandleA
GetCurrentProcess
GetFileAttributesA
SetFileAttributesA
GetVersionExA
GetWindowsDirectoryA
FlushInstructionCache
TerminateThread
HeapAlloc
GetLastError
HeapFree
GlobalAlloc
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
GetCommandLineA
HeapReAlloc
GetACP
GetOEMCP
GetCPInfo
VirtualFree
VirtualAlloc
IsBadWritePtr
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
HeapSize
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
FlushFileBuffers
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
InterlockedExchange
VirtualQuery
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoA
GetSystemInfo
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
QueryPerformanceCounter
GetLocaleInfoW
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
GetProcAddress
FreeLibrary
DeleteFileA
GetModuleFileNameA
CreateFileA
HeapCreate
CloseHandle
SetEndOfFile
wsprintfA
GetKeyboardType
RegQueryValueExA
ReportEventA
DeregisterEventSource
RegOpenKeyA
CloseServiceHandle
RegisterEventSourceA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegQueryInfoKeyA
IsValidSecurityDescriptor
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenServiceA
OpenSCManagerA
Ox12121212
Ox12345678
_DllMain@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ