Exec
ExecToLog
ExecToStack
Static task
static1
Behavioral task
behavioral1
Sample
3db02e19d77465fa12f13356a2468c93daa1707f39c3c40aafe9ad0e64af261a.dll
Resource
win7-20221111-en
Target
3db02e19d77465fa12f13356a2468c93daa1707f39c3c40aafe9ad0e64af261a
Size
115KB
MD5
3080e37aecef788a5e63c77b283015e0
SHA1
206d76468e9be9a414c3a1107dcad65343e9cc9a
SHA256
3db02e19d77465fa12f13356a2468c93daa1707f39c3c40aafe9ad0e64af261a
SHA512
a0417b0fae8a8beb6c44e4c5036070b4c053ac83dc377974439981413c83a43423d2ef7166b08de341de6e0d89ee7be548645fbdbd6056e4bbd66403a20950ec
SSDEEP
3072:Op82XLIbAapNuO8BMq2fpiRcX9gR8Z5J4/:Op82XkbTNRSfcN/JK
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
lstrlenA
GetExitCodeProcess
WaitForSingleObject
Sleep
TerminateProcess
GlobalReAlloc
GlobalUnlock
GlobalSize
lstrcpynA
ReadFile
PeekNamedPipe
GetTickCount
lstrcpyA
CreateProcessA
GetStartupInfoA
GetProcAddress
GlobalLock
DeleteFileA
lstrcmpiA
GetCurrentProcess
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileA
CopyFileA
GetTempFileNameA
GlobalFree
GlobalAlloc
GetModuleFileNameA
ExitProcess
GetCommandLineA
CreatePipe
GetVersionExA
lstrcatA
SendMessageA
OemToCharBuffA
FindWindowExA
CharNextA
wsprintfA
CharPrevA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Exec
ExecToLog
ExecToStack
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE