MvrmcLpK
lebCrWOF
YINiLnV
qpkcnKLKh
EWeo
tAKlxV
QEWCoKK
oPnrNbD
sfQksPAuy
mpicpDwuE
wbLEK
wTDClRQae
umJiQLUvC
wFAv
ekIlfW
OSMLlYUFA
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
0d6aad4b3fe886c7d24286d333094bed9eb2c6d5ee3f7afb7fabbd1538f440e2.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0d6aad4b3fe886c7d24286d333094bed9eb2c6d5ee3f7afb7fabbd1538f440e2.dll
Resource
win10v2004-en-20220112
Target
0d6aad4b3fe886c7d24286d333094bed9eb2c6d5ee3f7afb7fabbd1538f440e2
Size
243KB
MD5
7b5549a7d9e638eb713dce14c2ad357b
SHA1
171c328013f121ea18c68436c5450b89c50e8794
SHA256
0d6aad4b3fe886c7d24286d333094bed9eb2c6d5ee3f7afb7fabbd1538f440e2
SHA512
b62f454bc52de5975b9327889cf52f2a7103936bd3437156ab85e31119ed42b8ea19bc78cefa07ded3a6b9c87407c6bf43bff25275b25bb5073bb07b079a0616
SSDEEP
6144:G4iRkKcIMB8G1EtRKEe819YsScGhoRlkVN:vqkZbBw0EeonSZoRl4N
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegSetValueExW
RegOpenKeyExA
OpenServiceW
InitializeSecurityDescriptor
InitializeSecurityDescriptor
LookupAccountNameW
IsValidSecurityDescriptor
FreeSid
SetSecurityDescriptorDacl
LookupAccountSidW
RegQueryValueExW
GetLengthSid
RegDeleteValueW
RegCreateKeyExW
StartServiceW
RegQueryValueExA
GetSecurityDescriptorGroup
RegEnumKeyExW
CloseServiceHandle
GetSecurityDescriptorLength
GetSecurityDescriptorDacl
RegEnumValueW
RegCloseKey
RegDeleteKeyW
MakeSelfRelativeSD
GetAce
GetSecurityDescriptorOwner
InitializeAcl
GetAclInformation
EqualSid
SetSecurityDescriptorGroup
RegOpenKeyExW
SetSecurityDescriptorOwner
AddAccessAllowedAce
OpenSCManagerW
QueryServiceStatus
InitCommonControlsEx
DestroyPropertySheetPage
CreatePropertySheetPageW
CreateBitmapIndirect
GetTextExtentPoint32W
CreateCompatibleDC
GetObjectW
ImmAssociateContext
LockResource
LoadResource
InterlockedDecrement
IsBadWritePtr
GetWindowsDirectoryW
VirtualProtect
GetLastError
GetModuleFileNameW
FindResourceExW
QueryPerformanceCounter
MultiByteToWideChar
lstrcmpiW
DeleteCriticalSection
SetLastError
lstrlenW
lstrcatW
GetTickCount
lstrcpynW
GetUserDefaultUILanguage
GetComputerNameW
LeaveCriticalSection
GetCurrentProcessId
InitializeCriticalSection
InterlockedIncrement
HeapDestroy
LocalAlloc
GetProcAddress
GlobalAlloc
LoadLibraryW
FormatMessageW
GetDriveTypeW
Sleep
GetFileAttributesW
GlobalUnlock
GetModuleHandleW
WideCharToMultiByte
EnterCriticalSection
FreeLibrary
GetUserDefaultLCID
GetSystemDefaultUILanguage
LoadLibraryA
LocalFree
GetShortPathNameW
GetCurrentThreadId
GlobalLock
lstrcpyW
GlobalFree
GetSystemTimeAsFileTime
IsBadReadPtr
WNetGetConnectionW
_wcsdup
_initterm
_wtol
_mbschr
malloc
wcscpy
wcslen
__RTDynamicCast
iswdigit
_wcsnicmp
iswalpha
?terminate@@YAXXZ
wcstok
strchr
_wcsicmp
wcschr
_onexit
_purecall
free
wcscmp
wcscat
__dllonexit
_wtoi
__CxxFrameHandler
wcsncpy
iswascii
swscanf
memmove
wcsrchr
NetApiBufferFree
NetServerGetInfo
CoTaskMemFree
CoGetClassObject
CreateStreamOnHGlobal
StringFromGUID2
CoInitialize
CoTaskMemAlloc
ReleaseStgMedium
CLSIDFromProgID
CoCreateInstanceEx
StringFromCLSID
CoUninitialize
CoCreateInstance
FreeContextBuffer
EnumerateSecurityPackagesW
SHGetMalloc
ShellExecuteW
SHGetFileInfoW
SHBrowseForFolderW
ExtractIconExW
SHGetPathFromIDListW
wsprintfW
LoadStringW
IsWindowVisible
GetWindow
GetTabbedTextExtentW
CharNextW
GetDC
GetWindowRect
GetClientRect
PostMessageW
CharUpperW
DrawIconEx
RedrawWindow
SendMessageW
GetParent
LoadBitmapW
GetFocus
GetWindowTextLengthW
GetWindowInfo
ShowWindow
UnhookWindowsHookEx
RegisterClipboardFormatW
InvalidateRect
FillRect
GetDesktopWindow
IsWindowEnabled
EnableWindow
CallNextHookEx
ReleaseDC
GetWindowTextW
GetIconInfo
SetWindowsHookExW
LoadIconW
GetSysColor
MvrmcLpK
lebCrWOF
YINiLnV
qpkcnKLKh
EWeo
tAKlxV
QEWCoKK
oPnrNbD
sfQksPAuy
mpicpDwuE
wbLEK
wTDClRQae
umJiQLUvC
wFAv
ekIlfW
OSMLlYUFA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ