tDllFunc
tDllFunc2
Static task
static1
Behavioral task
behavioral1
Sample
be4e0b2443290ddf2579b581a39700848d38c9ca7529f9fccb09d83bab0d9571.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
be4e0b2443290ddf2579b581a39700848d38c9ca7529f9fccb09d83bab0d9571.dll
Resource
win10v2004-20221111-en
Target
be4e0b2443290ddf2579b581a39700848d38c9ca7529f9fccb09d83bab0d9571
Size
12KB
MD5
4cd8229baad4db53e5d01d209549722b
SHA1
3c7263941093e80bba780f33429e85a4591a626b
SHA256
be4e0b2443290ddf2579b581a39700848d38c9ca7529f9fccb09d83bab0d9571
SHA512
805183db5b40a7b9d8a303972f3c9ad2ec34cd67b5c172b3bbf2050daedecea799c286ed97911459c7020efb166df30258a3e3fdd2b09d5efcf8d2e5a0b59844
SSDEEP
192:Ntc8UK6tfwTw2WsFWuU0rD+GNfWn0yu+lKPbDv/:7cPtoVWsFWj0rDRe0to6//
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
gethostname
MessageBoxA
RegCreateKeyExA
CoInitializeSecurity
tDllFunc
tDllFunc2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE