DllMain
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
77d2d89e6d1fe8d9adf73f3454d2ba5630065caf35646d2904f8904bdfd06163.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77d2d89e6d1fe8d9adf73f3454d2ba5630065caf35646d2904f8904bdfd06163.dll
Resource
win10v2004-20220812-en
Target
77d2d89e6d1fe8d9adf73f3454d2ba5630065caf35646d2904f8904bdfd06163
Size
214KB
MD5
0d6a1e2150453832afe16811af56c0fb
SHA1
3fc0cda4f281d395bdff434457073f8ba37cea4f
SHA256
77d2d89e6d1fe8d9adf73f3454d2ba5630065caf35646d2904f8904bdfd06163
SHA512
4b24e23ce44732326f02086ba2cc21f0fdec8a264874436dc3bb219637a3065485a8e99581c62cc9f5a0d73c1d67f8884ba42aad0e2798372b5966f279f9f178
SSDEEP
6144:jaCxAsiZYDn2i15KbTG9UfmbIdZC+3kw7MqhOZZ:jDAzZYD2uKvGOfmcdZC+3k08j
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualFree
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
GetStdHandle
GetFileType
SetFilePointer
SetStdHandle
CloseHandle
FlushFileBuffers
LoadLibraryA
VirtualAlloc
HeapFree
HeapAlloc
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
SetLastError
GetLastError
HeapDestroy
HeapCreate
lstrcpyA
SetHandleCount
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
WideCharToMultiByte
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
ord175
ord192
ord189
ord134
ord163
ord174
ord179
ord188
ord191
ord190
DllMain
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE