Init
MY_DLL_MAIN
TjScan
Static task
static1
Behavioral task
behavioral1
Sample
2488f9562aa9e396755247cb648b9c91a9641cc67e6da72a2d8f2b6c4e2eed07.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2488f9562aa9e396755247cb648b9c91a9641cc67e6da72a2d8f2b6c4e2eed07.dll
Resource
win10v2004-20221111-en
Target
2488f9562aa9e396755247cb648b9c91a9641cc67e6da72a2d8f2b6c4e2eed07
Size
17KB
MD5
34d35b61698a43aa0afc2d589bbd9c10
SHA1
8c33bbe5fc897e853ecf2f9947bb1a4e97bf4ce0
SHA256
2488f9562aa9e396755247cb648b9c91a9641cc67e6da72a2d8f2b6c4e2eed07
SHA512
d9ade23009b7a9000dc8267bae8a90952831642f657bdf8d66ba27c44578fa8769057172c76db99ca3080108ffdce35b11ede55ce23a415ec4d3535e9082cacd
SSDEEP
384:iUo/w/F0YzWsrWzM8PkTGKX8WIbxzMQsi34:iU3/WYSs8WGKs5RMQsi34
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetProcAddress
LoadLibraryA
GetLastError
HeapAlloc
HeapReAlloc
HeapFree
ExitProcess
FindNextFileA
FindFirstFileA
FindClose
IsBadReadPtr
VirtualFree
VirtualAlloc
GetProcessHeap
GetCommandLineA
wsprintfA
MessageBoxA
Init
MY_DLL_MAIN
TjScan
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE