Data
ExecuteFile
Self
Static task
static1
Behavioral task
behavioral1
Sample
91e47250b17a4d03f07885d870c07ef200a23cc6db13901e91b0cb01bb64091a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91e47250b17a4d03f07885d870c07ef200a23cc6db13901e91b0cb01bb64091a.dll
Resource
win10v2004-20221111-en
Target
91e47250b17a4d03f07885d870c07ef200a23cc6db13901e91b0cb01bb64091a
Size
84KB
MD5
40d71bb42a04649993f45716360db0f9
SHA1
dd7b66d6aacb0c6b83e7c93bca5178a93361d87a
SHA256
91e47250b17a4d03f07885d870c07ef200a23cc6db13901e91b0cb01bb64091a
SHA512
26a87aa932e8286988ec39ad67d922a985afcc32123a1ff2cb908426281e982a2fcd6d0a79882e7e3e8c1b0d92902a5c1c5b0895c0f023df55ce3e3b8d69fb3b
SSDEEP
768:ILFFgxmpLa6mkbgsOGrNkkGO0+cBnq2sx1/+oe35YfHFNYbwIt9nnRbLwRY:ILFF06a6VrsOmBnq2sH/+LOj4xt9nRb
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTempPathW
LoadLibraryW
GetProcAddress
FreeLibrary
OutputDebugStringW
IsBadReadPtr
VirtualAlloc
GetModuleFileNameA
GetCommandLineW
WideCharToMultiByte
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
GetModuleHandleA
VirtualAllocEx
WriteProcessMemory
SetThreadContext
ResumeThread
WaitForSingleObject
TerminateProcess
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetLastError
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
WriteFile
LoadLibraryA
InitializeCriticalSection
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
HeapSize
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
CommandLineToArgvW
Data
ExecuteFile
Self
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE