SDDynDll01
SDDynDll02
SDDynDll03
SDDynDll04
SDDynDll05
SDDynDll06
SDDynDll07
SDDynDll08
SDDynDll09
SDDynDll10
SDDynDll11
SDDynDll12
SDDynDll13
SDDynDll14
SDDynDll15
SDDynDll16
SDDynDll17
SDDynDll18
SDDynDll19
SDDynDll20
Static task
static1
Behavioral task
behavioral1
Sample
81010cef4a7d40c9e185735144b5bf34ca828d277e6233c91f09cf540927ac64.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
81010cef4a7d40c9e185735144b5bf34ca828d277e6233c91f09cf540927ac64.dll
Resource
win10v2004-20220812-en
Target
81010cef4a7d40c9e185735144b5bf34ca828d277e6233c91f09cf540927ac64
Size
456KB
MD5
e771ce5f6c0cd1f289819c83265f09d0
SHA1
1c5fc833ad78267129c743bba246f7eb99fc3adf
SHA256
81010cef4a7d40c9e185735144b5bf34ca828d277e6233c91f09cf540927ac64
SHA512
a4afecbb925612f310f8f94a3878b9ec0bbc36650d446e476bad3cbe86e67a4ffe473529d6b47534a1f3cdf19107aa0fdad5ed344cd8679e0c503fa38ce650db
SSDEEP
6144:5RxNEfP/tAdi7WPK67fTKkB6NNEt7JbuuM4Q6ZOKWrs9P3f2sBg21WY:gftEi7i7+k4ctJu1C8slP2sBgxY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTickCount
CloseHandle
GetCurrentProcess
Module32Next
IsBadReadPtr
GetProcAddress
GetFullPathNameA
CreateFileA
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
Sleep
LoadLibraryA
WriteProcessMemory
VirtualProtectEx
OpenProcess
ReadFile
GetFileSize
VirtualFree
VirtualAlloc
GetModuleFileNameA
lstrcmpiA
Process32Next
Process32First
lstrcpyA
GetModuleHandleA
SetThreadPriority
CreateThread
lstrlenA
SetPriorityClass
CreateSemaphoreA
GetSystemDirectoryA
ReleaseSemaphore
FreeLibrary
CreateProcessA
WriteFile
VirtualProtect
DeleteFileA
GetLastError
OpenEventA
TerminateProcess
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapReAlloc
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
FindWindowA
wsprintfA
SendInput
SDDynDll01
SDDynDll02
SDDynDll03
SDDynDll04
SDDynDll05
SDDynDll06
SDDynDll07
SDDynDll08
SDDynDll09
SDDynDll10
SDDynDll11
SDDynDll12
SDDynDll13
SDDynDll14
SDDynDll15
SDDynDll16
SDDynDll17
SDDynDll18
SDDynDll19
SDDynDll20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE