SDDynDll01
SDDynDll02
SDDynDll03
SDDynDll04
SDDynDll05
SDDynDll06
SDDynDll07
SDDynDll08
SDDynDll09
SDDynDll10
SDDynDll11
SDDynDll12
SDDynDll13
SDDynDll14
SDDynDll15
SDDynDll16
SDDynDll17
SDDynDll18
SDDynDll19
SDDynDll20
Static task
static1
Behavioral task
behavioral1
Sample
f9a7a33741717177a29d8d119c85bd836b169a3d98dac15c2070e41f72376394.dll
Resource
win7-20220812-en
Target
f9a7a33741717177a29d8d119c85bd836b169a3d98dac15c2070e41f72376394
Size
416KB
MD5
2c1cf79dfa30ccc4586a8443f7dcdb10
SHA1
9ae8002e9db5133e968401cca04a9030f6e155d6
SHA256
f9a7a33741717177a29d8d119c85bd836b169a3d98dac15c2070e41f72376394
SHA512
67baffb2bc76e69574b17382c0f23aa9f0f31c950be8395d2faa48da7d46f5cc5da7e5f1c842c42b75d9f520a089d5c88405937630467757a0e7a220ed3732a6
SSDEEP
12288:ikqfnX8AVe4xNJOF3cuMdTGQSWT8kTY/:ikqfnsMO5cuMtGFp9
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCommandLineA
VirtualAlloc
GetCurrentProcess
CloseHandle
OpenProcess
Module32Next
IsBadReadPtr
GetProcAddress
GetFullPathNameA
CreateFileA
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
Sleep
SetProcessAffinityMask
GetProcessAffinityMask
LoadLibraryA
WriteProcessMemory
VirtualProtectEx
GetTickCount
ReadFile
GetFileSize
GetModuleFileNameA
lstrcmpiA
Process32Next
Process32First
lstrcpyA
GetModuleHandleA
SetThreadPriority
CreateThread
lstrlenA
SetPriorityClass
CreateSemaphoreA
GetSystemDirectoryA
ReleaseSemaphore
FreeLibrary
CreateProcessA
WriteFile
VirtualProtect
DeleteFileA
GetLastError
OpenEventA
ExitProcess
TerminateProcess
GetStartupInfoA
GetFileType
InterlockedDecrement
InterlockedIncrement
VirtualFree
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapReAlloc
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
SendInput
FindWindowA
wsprintfA
SDDynDll01
SDDynDll02
SDDynDll03
SDDynDll04
SDDynDll05
SDDynDll06
SDDynDll07
SDDynDll08
SDDynDll09
SDDynDll10
SDDynDll11
SDDynDll12
SDDynDll13
SDDynDll14
SDDynDll15
SDDynDll16
SDDynDll17
SDDynDll18
SDDynDll19
SDDynDll20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE