kDVMjxaxZYsr
setPath
Behavioral task
behavioral1
Sample
7751a09b3c1146b5db72be1218287da6fd4c65813a1eb9ae5e0389db879daaeb.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7751a09b3c1146b5db72be1218287da6fd4c65813a1eb9ae5e0389db879daaeb.dll
Resource
win10v2004-20220812-en
Target
7751a09b3c1146b5db72be1218287da6fd4c65813a1eb9ae5e0389db879daaeb
Size
1.4MB
MD5
12a99f8ae458862da2eddfb661ae7ced
SHA1
f5f31414a29dac9e35888cd48a980d702f99fe70
SHA256
7751a09b3c1146b5db72be1218287da6fd4c65813a1eb9ae5e0389db879daaeb
SHA512
660032ffdb21aebda0ac30d363b198dab70187c3848c3e9c727f02b00e5ecd351bc85e1bd5b2fb4d568a90c2ce5ad2a058e20b42d0aaff4b12bcb46cfee58526
SSDEEP
24576:g1GayIeFrnKgVGPCXr++xDTku+h5UZasJ2QfeFDXTZ9DztMa:ZQgVsCXfgu+h5UFpGFDN9D6a
bumblebee
r_traits@_W@std@@@std@@@std@@
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
StrToIntA
StrChrA
PathFindFileNameW
VirtualFree
lstrcpyA
lstrcmpA
lstrcatA
GetProcAddress
FreeLibrary
VirtualAlloc
GetCurrentThread
GetCurrentThreadId
CloseHandle
GetModuleHandleW
VirtualProtectEx
LoadLibraryA
GetModuleHandleA
VirtualQuery
lstrlenA
VirtualQueryEx
GetCurrentProcess
UnmapViewOfFile
kDVMjxaxZYsr
setPath
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ