?rundll@@YGXPAUHWND__@@PAUHINSTANCE__@@PBDH@Z
rundll32
Static task
static1
Behavioral task
behavioral1
Sample
ddc40e64677569b76e2cc2c7357cb787d5cccf4268ebd7c30c135569b4eecf79.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ddc40e64677569b76e2cc2c7357cb787d5cccf4268ebd7c30c135569b4eecf79.dll
Resource
win10v2004-20220901-en
Target
ddc40e64677569b76e2cc2c7357cb787d5cccf4268ebd7c30c135569b4eecf79
Size
3KB
MD5
d04092bd50d306998ac25971f7312c10
SHA1
ee7cd752a9e53eb2d065f88a585070cbd0833036
SHA256
ddc40e64677569b76e2cc2c7357cb787d5cccf4268ebd7c30c135569b4eecf79
SHA512
c229cd116be87ee07a9caeb0d0eb50fd64dd0c75472e62c3590c862964b7ac35a312ed4931b442569048a89adf9cabd403ca9941fbe374df6a390357996dcac3
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
?rundll@@YGXPAUHWND__@@PAUHINSTANCE__@@PBDH@Z
rundll32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ