Ej
GetProcessID
In
Static task
static1
Behavioral task
behavioral1
Sample
dadaf07f197afe10156d99046b3c4c0dbcfa1a4c6d08df2210893651717c109f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dadaf07f197afe10156d99046b3c4c0dbcfa1a4c6d08df2210893651717c109f.dll
Resource
win10v2004-20220812-en
Target
dadaf07f197afe10156d99046b3c4c0dbcfa1a4c6d08df2210893651717c109f
Size
31KB
MD5
f79ce1919fee2c1d35926cefdaa51953
SHA1
a1af32b86181768b5898b2aff4a7914810b6aad5
SHA256
dadaf07f197afe10156d99046b3c4c0dbcfa1a4c6d08df2210893651717c109f
SHA512
6d25268371fa647676b6fdf543d728797e3621ca336c16ac28d94642ebe025cf89ea74f38f63b7dd4ab6807a316f578d63891aa0f584cda6e77e31d5dbfa564b
SSDEEP
768:PMp+uO0TkqqjM8Aq4W2LS4aZmagJ7DLy:P0fO0TuMS4W2LDa0py
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
GetModuleHandleA
GetProcAddress
SetTimer
OpenProcessToken
Ej
GetProcessID
In
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE