DllMain
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
67104bd6f572f0079dd14ec63d44f7b3ce78e7f1c3d6d0800107642e79e30912.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67104bd6f572f0079dd14ec63d44f7b3ce78e7f1c3d6d0800107642e79e30912.dll
Resource
win10v2004-20220812-en
Target
67104bd6f572f0079dd14ec63d44f7b3ce78e7f1c3d6d0800107642e79e30912
Size
254KB
MD5
a2b66424ce96f2e42291f2133d440d9c
SHA1
86e6bfc7324eaffaa5eb9ce05dc21b58fac920e0
SHA256
67104bd6f572f0079dd14ec63d44f7b3ce78e7f1c3d6d0800107642e79e30912
SHA512
81719b8f55b8c77883d5c3a5efda0997b30cbcd703a853a953c8ad84a7f07c8b0ee10ec98a58a48116b7194ec53a146e4b8e8d9f04b1b573672306be7968dc1b
SSDEEP
6144:HKJ3t+g0QPekyswLCwuSr08hKZFXZoMq3gv:HY3h0igTx9nXMOc
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetHandleCount
GetFileType
lstrcpyA
LCMapStringW
LCMapStringA
HeapFree
HeapAlloc
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetLocaleInfoW
GetStdHandle
GetStartupInfoA
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
SetFilePointer
LoadLibraryA
SetStdHandle
FlushFileBuffers
CloseHandle
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ord192
ord128
ord163
ord190
ord189
ord188
ord191
DllMain
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE