EventLogon
EventStartup
Static task
static1
Behavioral task
behavioral1
Sample
db67514d96d85d427954e2badcd495e300e6e5a6d5fc742522bf6b9a94112bfb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db67514d96d85d427954e2badcd495e300e6e5a6d5fc742522bf6b9a94112bfb.dll
Resource
win10v2004-20220812-en
Target
db67514d96d85d427954e2badcd495e300e6e5a6d5fc742522bf6b9a94112bfb
Size
32KB
MD5
0f70f6d6c7105377e9d1f8493deb0180
SHA1
5a2ccd95189c5854474745abf6a78c41582540b5
SHA256
db67514d96d85d427954e2badcd495e300e6e5a6d5fc742522bf6b9a94112bfb
SHA512
0de7cc0c85f9b383dc86c898e749ba5175e71613ccc9cd625892f5fecd374fab4ecafd449e33c7e5b1a1e859882da1dcf1f761eb3d9d1d752cf4ab794b81fa24
SSDEEP
384:BBzfrSFsTMp8flmM+wjDmlhelyvd37gogo9qMWl1Wn8tEj:bzksTMu9mM9jRl0LJgo9MnOj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
CreateThread
GetProcAddress
GetModuleHandleA
VirtualProtect
GlobalFree
GetLastError
WriteFile
lstrlenA
SetFilePointer
CreateFileA
lstrcatA
GetSystemDirectoryA
GlobalAlloc
lstrlenW
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
HeapReAlloc
VirtualAlloc
GetOEMCP
GetACP
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
RtlUnwind
wsprintfW
wsprintfA
InternetOpenUrlA
InternetOpenA
EventLogon
EventStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ