?Olololololo11@@YGPAXXZ
?Olololololo22@@YGPAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
dd830d5e13f5f9b60b48d9008126a03b39aa8f2b58354ecd48825cdeef0fb1ae.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd830d5e13f5f9b60b48d9008126a03b39aa8f2b58354ecd48825cdeef0fb1ae.dll
Resource
win10v2004-20220901-en
Target
dd830d5e13f5f9b60b48d9008126a03b39aa8f2b58354ecd48825cdeef0fb1ae
Size
96KB
MD5
041044e4354c974cd3c99150fb72428a
SHA1
f7399c3b21499dd747e95819ea3f7b7bfeef7421
SHA256
dd830d5e13f5f9b60b48d9008126a03b39aa8f2b58354ecd48825cdeef0fb1ae
SHA512
bf532a57adab21bdb813247e3b027017dd2759e3c8f2789e47b7e87d1215c0264c0be1337b787090e86a7e166546d7bc00b664174a097348e57ed38b39a468a7
SSDEEP
1536:MU0kJZWqLqPNegkhV/tKYdYMFq/WezAg51CwuePIah2DdiTe2Q6LEnotA:mkJZPLCkhyYnv8bwak6eSHt
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleBaseNameA
GetCurrentProcess
HeapFree
WaitForSingleObject
VirtualFree
GetProcessHeap
TlsSetValue
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
HeapAlloc
GlobalFree
LoadLibraryA
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
VirtualQuery
TlsGetValue
GetFileSize
CreateFileA
ReleaseSemaphore
CreateSemaphoreA
VirtualAlloc
SetScrollInfo
UpdateWindow
SetWindowTextA
PostMessageA
ShowWindow
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
ModifyMenuA
SendMessageA
GetWindowRect
DestroyWindow
GetActiveWindow
DrawTextA
GetWindowInfo
GetDC
ReleaseDC
SetWindowPos
FindWindowA
GetForegroundWindow
MoveWindow
MoveToEx
Polyline
CreateCompatibleDC
SelectObject
DeleteDC
LineTo
BitBlt
CreatePen
_except_handler3
memset
?Olololololo11@@YGPAXXZ
?Olololololo22@@YGPAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ