ImgClose
ImgCmp
ImgDcmp
ImgGetDefault
ImgOpen
ImgPeekHeader
Static task
static1
Behavioral task
behavioral1
Sample
aa6240bac394a76a42196f7484f70bba93dba467212747248aa2080371a35f03.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa6240bac394a76a42196f7484f70bba93dba467212747248aa2080371a35f03.dll
Resource
win10v2004-20220812-en
Target
aa6240bac394a76a42196f7484f70bba93dba467212747248aa2080371a35f03
Size
194KB
MD5
8510038a098560f613b1cb473234a25d
SHA1
7d9aafe6f9e39c8ec2051372663205c31f3dccbb
SHA256
aa6240bac394a76a42196f7484f70bba93dba467212747248aa2080371a35f03
SHA512
0ac9ade4a550f4daf2e744ceb03a755dc560697586bb3557992bf8292542db59050119970d8e6f295c6ffb31f23a2c48060c6c4af007eb61c6898ceeb920a83d
SSDEEP
3072:CJs1kMZZRC+YyUIXYuIZxADrqYiHooMs+yxd7byZCAfVAEX1KW53L1Zxj:CMZChYhIwvImyxVWZCAtVlKaPxj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord28
ord31
ord25
ord24
TlsGetValue
SetLastError
SetEndOfFile
LoadLibraryA
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetLastError
WriteFile
ReadFile
HeapFree
CloseHandle
SetFilePointer
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
GetOEMCP
HeapDestroy
HeapCreate
VirtualFree
SetHandleCount
GetFileType
GetStdHandle
GetStartupInfoA
GetModuleFileNameA
GetCPInfo
GetACP
WideCharToMultiByte
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapAlloc
SetStdHandle
FlushFileBuffers
CreateFileA
VirtualAlloc
ImgClose
ImgCmp
ImgDcmp
ImgGetDefault
ImgOpen
ImgPeekHeader
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE