DllMain
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
12ce46ae48dc2b5a06d684811982648f126dff9a369cb94211835d6679db21be.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
12ce46ae48dc2b5a06d684811982648f126dff9a369cb94211835d6679db21be.dll
Resource
win10v2004-20220812-en
Target
12ce46ae48dc2b5a06d684811982648f126dff9a369cb94211835d6679db21be
Size
87KB
MD5
27ed24a690154886661b1decf6b096c0
SHA1
c5db6bb66a2eb808bbc5432991b99ff5a3328889
SHA256
12ce46ae48dc2b5a06d684811982648f126dff9a369cb94211835d6679db21be
SHA512
859fca0cbed733276b0f7442a9a1a9bfb98564745579f2819b83018809cf2d938b6d31a049120be8ff6ae9630d27a0fb849310492fe5c0c76dd11170161bfa38
SSDEEP
1536:6rU9irtrlSxUAIyvFh7ciHJlgQQxf5BXNdR7QSKOEpuriP6XKY532mntCa:6rU9irtpSxUAIyFhPJzQxxdR7QJ3wiSO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetHandleCount
GetFileType
lstrcpyA
SetFilePointer
SetStdHandle
CloseHandle
FlushFileBuffers
LoadLibraryA
VirtualAlloc
HeapFree
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
GetEnvironmentStrings
GetStdHandle
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
InitializeCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
ord163
ord191
ord190
ord189
ord174
ord192
ord179
ord188
DllMain
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE