SDDynDll01
SDDynDll02
SDDynDll03
SDDynDll04
SDDynDll05
SDDynDll06
SDDynDll07
SDDynDll08
SDDynDll09
SDDynDll10
SDDynDll11
SDDynDll12
SDDynDll13
SDDynDll14
SDDynDll15
SDDynDll16
SDDynDll17
SDDynDll18
SDDynDll19
SDDynDll20
Static task
static1
Behavioral task
behavioral1
Sample
e50dbac570ae649273ccde196de41ff7b3bf7a98dbc4d2c61dbe81778ef9dfba.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e50dbac570ae649273ccde196de41ff7b3bf7a98dbc4d2c61dbe81778ef9dfba.dll
Resource
win10v2004-20221111-en
Target
e50dbac570ae649273ccde196de41ff7b3bf7a98dbc4d2c61dbe81778ef9dfba
Size
412KB
MD5
bb42359b879c0b07a701f2970c198526
SHA1
73f99f82d940de8e42792813704747d832b25569
SHA256
e50dbac570ae649273ccde196de41ff7b3bf7a98dbc4d2c61dbe81778ef9dfba
SHA512
71e276e5eee9c549e282c49a3476707f4134a5ad287b1fffd2659e748d3a0829395247c6cd9b35d2542f59ecbafe2aec075c556396afd85017b3340a3b27eb08
SSDEEP
12288:3xwHy97SfDqfUr7GFPUGFbAyanSoqBn09DN:3iSwfmfUEZaQBn0j
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
CloseHandle
GetCurrentProcess
Module32Next
IsBadReadPtr
GetProcAddress
GetFullPathNameA
CreateFileA
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
Sleep
LoadLibraryA
WriteProcessMemory
VirtualProtectEx
OpenProcess
ReadFile
GetFileSize
VirtualFree
VirtualAlloc
GetModuleFileNameA
lstrcmpiA
Process32Next
Process32First
lstrcpyA
GetModuleHandleA
SetThreadPriority
CreateThread
lstrlenA
SetPriorityClass
CreateSemaphoreA
GetSystemDirectoryA
ReleaseSemaphore
FreeLibrary
CreateProcessA
WriteFile
VirtualProtect
DeleteFileA
GetLastError
OpenEventA
TerminateProcess
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapReAlloc
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
FindWindowA
wsprintfA
SendInput
SDDynDll01
SDDynDll02
SDDynDll03
SDDynDll04
SDDynDll05
SDDynDll06
SDDynDll07
SDDynDll08
SDDynDll09
SDDynDll10
SDDynDll11
SDDynDll12
SDDynDll13
SDDynDll14
SDDynDll15
SDDynDll16
SDDynDll17
SDDynDll18
SDDynDll19
SDDynDll20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ