DllMain
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
9b497477b5eab7f4f0ef0a59d63654a14259202e74f0e308db0b8df37ff43e0a.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9b497477b5eab7f4f0ef0a59d63654a14259202e74f0e308db0b8df37ff43e0a.dll
Resource
win10v2004-20220901-en
Target
9b497477b5eab7f4f0ef0a59d63654a14259202e74f0e308db0b8df37ff43e0a
Size
137KB
MD5
3ad0c09f49509924aef20c732f4329d0
SHA1
fcb0e0dbff750b9d1e8543d859e3b55497b2f5a8
SHA256
9b497477b5eab7f4f0ef0a59d63654a14259202e74f0e308db0b8df37ff43e0a
SHA512
05ed6439aea7ed791aa9a1cd61fdb31414f17b3702f0f920e59f145e28e011bdfb56ec45ac1af4da4454558bd50a36a672bc6354f131da2772e7e01df83b7064
SSDEEP
3072:OfLqj4IZae818PLNfU9PqlMISyWF607iqsxF1z:1jufqZfUVKHSyb0aFV
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetHandleCount
GetFileType
lstrcpyA
SetFilePointer
SetStdHandle
CloseHandle
FlushFileBuffers
LoadLibraryA
VirtualAlloc
HeapFree
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
GetEnvironmentStrings
GetStdHandle
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
InitializeCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
ord163
ord191
ord190
ord189
ord280
ord192
ord281
ord188
DllMain
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE