ebijibol
igagagihu
odihakas
oqohabi
oxusapuma
sorizudaziwa
uzirirato
xufunuqad
zicicenorus
Static task
static1
Behavioral task
behavioral1
Sample
8844fc625f51b6333d5527ec8a5937794fbecc4a4714300d8f99266d66a32ffb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8844fc625f51b6333d5527ec8a5937794fbecc4a4714300d8f99266d66a32ffb.dll
Resource
win10v2004-20220812-en
Target
8844fc625f51b6333d5527ec8a5937794fbecc4a4714300d8f99266d66a32ffb
Size
868KB
MD5
91c6d89e4f174d7f6bd2b02ac1617fe0
SHA1
15775c60ce0ec8569b7e67c760c49875747e9e81
SHA256
8844fc625f51b6333d5527ec8a5937794fbecc4a4714300d8f99266d66a32ffb
SHA512
bc1a338ea28a41092113420a5b0c9b4ce2e41bf2b52660c7b7b4955c09a4175e47e61dac99fdc1aee7d78a1f6fc2c53ad78a37976ad6f67af23ad9d72f21c3a8
SSDEEP
12288:1pdXfpsLrgSCQhQ0FW1Vy7Yzi2nNP7NmD9/+:/WgSC8Lw1Vy7ui2nNTND
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
ExitProcess
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
RtlUnwind
InterlockedExchange
VirtualQuery
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
GetFocus
ebijibol
igagagihu
odihakas
oqohabi
oxusapuma
sorizudaziwa
uzirirato
xufunuqad
zicicenorus
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ