bypass
entry
Static task
static1
Behavioral task
behavioral1
Sample
567ded6901949c28930bda5953af0e88399ced09d883353d3035525653d3bfa9.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
567ded6901949c28930bda5953af0e88399ced09d883353d3035525653d3bfa9.dll
Resource
win10v2004-20220812-en
Target
567ded6901949c28930bda5953af0e88399ced09d883353d3035525653d3bfa9
Size
17KB
MD5
477eec396234cff988a7487f30be2140
SHA1
40bb980d25fee844813e051f2cb786c9aeafcbd5
SHA256
567ded6901949c28930bda5953af0e88399ced09d883353d3035525653d3bfa9
SHA512
07be1ad6af9cec376586569a5edb4a82054e648fe92ea3af23bb6eaefa5bca5846ce6ed8d7b083f1ae5894405f54b36547481abdeb8933d5a7716d99f94514da
SSDEEP
192:4+cuJ7pp4NaeiB6M10FmH9fveOdsAo13oIwAQqK7go/kWA8IgHmRPXYd4PTG:4+cw7pXezMqLCK13xxK7gf8IgHmRPbrG
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateFileA
lstrlenA
PeekNamedPipe
MoveFileExA
SetErrorMode
FreeLibrary
HeapAlloc
MoveFileExW
HeapFree
WaitForSingleObject
SetEvent
ConnectNamedPipe
GetTickCount
VirtualFree
GetProcessHeap
IsBadReadPtr
WriteFile
InitializeCriticalSection
GlobalAlloc
LoadLibraryW
TerminateThread
Sleep
CreateEventA
LeaveCriticalSection
ReadFile
lstrcatA
DisconnectNamedPipe
GetProcAddress
VirtualAlloc
CreateNamedPipeA
EnterCriticalSection
SetFileAttributesA
GlobalFree
ResetEvent
LoadLibraryA
OpenEventA
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
GetVersionExA
CloseHandle
GlobalReAlloc
CreateThread
lstrcpyA
_stricmp
_wcsicmp
sprintf
free
strstr
strchr
strrchr
wcstombs
realloc
_initterm
malloc
_adjust_fdiv
memset
memcpy
_except_handler3
bypass
entry
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ