RunDllHostsallBack
_�����ӳ���
Static task
static1
Behavioral task
behavioral1
Sample
993490adf2a1a85bcacac2124243851def4e581d315e6a2da670001886f3ee4a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
993490adf2a1a85bcacac2124243851def4e581d315e6a2da670001886f3ee4a.dll
Resource
win10v2004-20220812-en
Target
993490adf2a1a85bcacac2124243851def4e581d315e6a2da670001886f3ee4a
Size
384KB
MD5
c5640d9472b2348eb449296078f233da
SHA1
6606c4584a753a08c31242557c89d40bfc780123
SHA256
993490adf2a1a85bcacac2124243851def4e581d315e6a2da670001886f3ee4a
SHA512
a019be813bed706bfcb6be41e4ca602f75caf271c19ae6f14ae59bd187c71589bad02adc9623c92b2d53e862bf94c052047421e82bf1ee376abddeff7db479fd
SSDEEP
6144:FxDJVcOrsVfwDgSX2g9GFfrN3XSOBIk3rmv1Hu5AOb1l66Tt/puWA/v0s:Fh2fugMLUlrpDuMYluxu4uZvn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
OpenClipboard
CreateRectRgnIndirect
waveOutReset
ClosePrinter
RegQueryValueA
Shell_NotifyIconA
OleUninitialize
SysAllocString
ImageList_Destroy
ioctlsocket
GetFileTitleA
RunDllHostsallBack
_�����ӳ���
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE