DllMain
L_BrowseDir
Static task
static1
Behavioral task
behavioral1
Sample
8f238efdc1184622c2fdd9cb638a4842c1e7cc197a06d6874491f49d95bc6882.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f238efdc1184622c2fdd9cb638a4842c1e7cc197a06d6874491f49d95bc6882.dll
Resource
win10v2004-20220812-en
Target
8f238efdc1184622c2fdd9cb638a4842c1e7cc197a06d6874491f49d95bc6882
Size
257KB
MD5
a16f846057d8566285605bf874875f6f
SHA1
f79fb8435444425e966358bd5ba292257524ae61
SHA256
8f238efdc1184622c2fdd9cb638a4842c1e7cc197a06d6874491f49d95bc6882
SHA512
df6ed9e3acb35e48e6307c009accb12d8ed1429168227c52264bcaa676f11c50ec810b1c782560c5441762dadb6afad14c9a00d80d4a08f48ac78a7231980fd6
SSDEEP
6144:GCUM2t+g0QPekyswLCwuSr08hKZFXZoMq3P:r2h0igTx9nXMOP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetACP
FindNextFileA
lstrcatA
lstrlenA
lstrcpyA
lstrcmpA
GetLastError
FindFirstFileA
GetEnvironmentStrings
FreeEnvironmentStringsW
MultiByteToWideChar
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
SetHandleCount
GetFileType
GetStdHandle
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
GetCPInfo
FindClose
GetOEMCP
FreeEnvironmentStringsA
GetStringTypeA
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
VirtualAlloc
LoadLibraryA
GetStringTypeW
LCMapStringA
LCMapStringW
GetLocaleInfoA
GetLocaleInfoW
FlushFileBuffers
CloseHandle
SetStdHandle
SetFilePointer
ord185
ord100
ord125
DllMain
L_BrowseDir
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE