SDDynDll01
SDDynDll02
SDDynDll03
SDDynDll04
SDDynDll05
SDDynDll06
SDDynDll07
SDDynDll08
SDDynDll09
SDDynDll10
SDDynDll11
SDDynDll12
SDDynDll13
SDDynDll14
SDDynDll15
SDDynDll16
SDDynDll17
SDDynDll18
SDDynDll19
SDDynDll20
Static task
static1
Behavioral task
behavioral1
Sample
2f788bf27c37c902609ba19cff588c59457807fdbab5cdf56f92bf710758b665.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2f788bf27c37c902609ba19cff588c59457807fdbab5cdf56f92bf710758b665.dll
Resource
win10v2004-20220812-en
Target
2f788bf27c37c902609ba19cff588c59457807fdbab5cdf56f92bf710758b665
Size
396KB
MD5
65e630102168f10f8676390d63a6bdfa
SHA1
24d68a06b6eb0255890b3e6a36a510fd7d1485bd
SHA256
2f788bf27c37c902609ba19cff588c59457807fdbab5cdf56f92bf710758b665
SHA512
8a26b21dedc4b733cb940f870c419d8c2985a89e4904786cc4ca5719e282b902e67b149963f3fb5272bfd0d7c4b784ae4865f7bf7844d519b1f26a265d1c2b51
SSDEEP
6144:NRxNEfP/tAdi7WPK67fTKkB6NNEt7JbuuM4Q6ZOKWrs9P3f2sBg21WY9:8ftEi7i7+k4ctJu1C8slP2sBgxY9
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
CloseHandle
GetCurrentProcess
Module32Next
IsBadReadPtr
GetProcAddress
GetFullPathNameA
CreateFileA
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
Sleep
LoadLibraryA
WriteProcessMemory
VirtualProtectEx
OpenProcess
ReadFile
GetFileSize
VirtualFree
VirtualAlloc
GetModuleFileNameA
lstrcmpiA
Process32Next
Process32First
lstrcpyA
GetModuleHandleA
SetThreadPriority
CreateThread
lstrlenA
SetPriorityClass
CreateSemaphoreA
GetSystemDirectoryA
ReleaseSemaphore
FreeLibrary
CreateProcessA
WriteFile
VirtualProtect
DeleteFileA
GetLastError
OpenEventA
TerminateProcess
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapReAlloc
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
FindWindowA
wsprintfA
SendInput
SDDynDll01
SDDynDll02
SDDynDll03
SDDynDll04
SDDynDll05
SDDynDll06
SDDynDll07
SDDynDll08
SDDynDll09
SDDynDll10
SDDynDll11
SDDynDll12
SDDynDll13
SDDynDll14
SDDynDll15
SDDynDll16
SDDynDll17
SDDynDll18
SDDynDll19
SDDynDll20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ