sICEsYfI
drukal
eUQJMVA
EHGGU
kefNSAD
WkIdRAfmr
JUyUB
NbuDTQMA
FEDJsB
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
219594d5b634d5f95904376a1cbd8ecde93b8cdd6cfb785069e51e7eccc78baa.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
219594d5b634d5f95904376a1cbd8ecde93b8cdd6cfb785069e51e7eccc78baa.dll
Resource
win10v2004-en-20220113
Target
219594d5b634d5f95904376a1cbd8ecde93b8cdd6cfb785069e51e7eccc78baa
Size
276KB
MD5
0448f77a9999f945a136305716eabe49
SHA1
7d906884962033eb5381fcb018fce79779578584
SHA256
219594d5b634d5f95904376a1cbd8ecde93b8cdd6cfb785069e51e7eccc78baa
SHA512
3270f2a146bf94a5e6981e6d99fde8b9204bb90f5b6b04305261fb6bc10541664bd2f8d6cde290e4296f81c602b649ed6ffc6315c67590506625e59f8263e6db
SSDEEP
6144:lqe14gep2//Hokkjx1ECmIt6Kc6GadqYAzXF3K6jS5:/149ppk4jECmIDzu5RjC
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetSecurityInfo
IsValidSid
BuildImpersonateTrusteeW
RegCloseKey
ProcessTrace
GetTokenInformation
LookupPrivilegeDisplayNameA
GetEventLogInformation
SystemFunction006
WmiMofEnumerateResourcesW
RegQueryValueExW
SystemFunction012
RegQueryValueExA
SystemFunction016
LsaQueryInfoTrustedDomain
GetSecurityDescriptorOwner
ObjectCloseAuditAlarmA
LookupPrivilegeDisplayNameW
SaferCreateLevel
RegOpenKeyExA
CreateSolidBrush
SelectPalette
StretchBlt
SelectObject
SetTextColor
GetDeviceCaps
ExtTextOutW
DeleteObject
BitBlt
CreateCompatibleDC
SetBkColor
DeleteDC
RealizePalette
SendARP
GetBestInterface
DeleteIpNetEntry
GetAdaptersInfo
GetInterfaceInfo
SetLocalPrimaryComputerNameW
CallNamedPipeA
CreateThread
GetMailslotInfo
GetSystemTimeAsFileTime
lstrlenW
BindIoCompletionCallback
ExpandEnvironmentStringsA
WaitForSingleObject
LoadLibraryA
PeekNamedPipe
VirtualProtect
FormatMessageA
FreeLibrary
GetVersion
WriteFile
GetWindowsDirectoryA
GetCurrentThreadId
LoadResource
SetThreadPriority
GetDriveTypeA
GlobalGetAtomNameA
lstrcmpA
UnlockFile
GetModuleHandleA
FindResourceExW
GetDriveTypeW
GetProcAddress
CreateDirectoryA
GetCurrentProcessId
GlobalUnlock
GetCurrentProcess
MulDiv
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
IsWow64Process
SetComputerNameW
SetLastError
AddRefActCtx
LoadLibraryW
SetNamedPipeHandleState
InterlockedIncrement
GetExitCodeProcess
lstrlenA
InterlockedDecrement
CreateFileMappingA
SetVolumeLabelW
WaitNamedPipeA
SizeofResource
ReleaseActCtx
CreateMailslotA
InitializeCriticalSection
GetComputerNameA
CreateEventA
MultiByteToWideChar
GetLastError
ReadFile
GetTickCount
SetUnhandledExceptionFilter
EnterCriticalSection
DeleteFileW
GetOverlappedResult
CreateFileA
QueryPerformanceCounter
GetNamedPipeHandleStateA
GetTempPathA
UnhandledExceptionFilter
LocalAlloc
CloseHandle
TransactNamedPipe
GetVersionExA
lstrcpynW
WritePrivateProfileStringA
WaitForMultipleObjects
SetComputerNameA
SetEvent
lstrcmpiA
SetMailslotInfo
LocalFree
LoadLibraryExA
SetThreadPriorityBoost
LocalReAlloc
Sleep
ResetEvent
GetNamedPipeInfo
lstrcpyW
SetFileAttributesA
GetComputerNameW
LockResource
GlobalGetAtomNameW
TerminateProcess
CreateProcessA
wcslen
isdigit
wcscmp
_strnicmp
free
wcscpy
wcschr
wcsncpy
wcscat
getenv
strncpy
toupper
strchr
memmove
malloc
_stricmp
_vsnprintf
_initterm
_strupr
NetapipBufferAllocate
NetApiBufferFree
Netbios
NetWkstaUserGetInfo
NetWkstaGetInfo
RtlInitUnicodeString
RtlUnicodeToOemN
NlsMbOemCodePageTag
RtlFreeHeap
NtOpenThreadToken
NtOpenProcessToken
NtImpersonateAnonymousToken
RtlCopyLuid
RtlOemToUnicodeN
NtClose
RtlUnicodeStringToAnsiString
RtlInitAnsiString
RtlUnicodeToMultiByteN
RtlNtStatusToDosError
NtCreateFile
RtlAnsiStringToUnicodeString
NtSetInformationThread
RtlAllocateHeap
NtQueryInformationToken
NtFsControlFile
RtlxUnicodeStringToOemSize
RtlUnicodeStringToOemString
RtlFreeUnicodeString
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CLSIDFromString
CoInitialize
CoUninitialize
IPSecAssignPolicy
IPSecClosePolicyStore
IPSecCreateFilterData
SHChangeNotifySuspendResume
SHGetPathFromIDListA
SHCreateQueryCancelAutoPlayMoniker
SHGetDesktopFolder
SHBindToParent
SHGetMalloc
SHGetFolderPathAndSubDirW
ShellExecuteExA
DragAcceptFiles
SHFileOperationA
SHGetUnreadMailCountW
FindExecutableW
SHBrowseForFolderA
SHAppBarMessage
SHGetSpecialFolderLocation
SHFormatDrive
DragQueryFileA
SHGetFolderPathA
SHChangeNotify
StrCmpW
StrToIntW
StrCmpIW
StrCpyNW
StrChrW
StrCpyW
StrStrW
lineOpenW
lineGetCallInfoW
lineClose
lineInitializeExW
lineGetNewCalls
lineGetAddressCapsW
lineShutdown
lineNegotiateAPIVersion
CreateURLMoniker
ChangeClipboardChain
SendMessageW
CreateIconFromResourceEx
InvalidateRect
CopyRect
MapVirtualKeyExA
SetRect
GetDC
RegisterRawInputDevices
IsWindowVisible
SetForegroundWindow
wvsprintfA
GetMenuItemID
GrayStringA
GetSystemMetrics
IsIconic
TranslateMessage
SetFocus
DestroyIcon
RemovePropA
ReleaseDC
SendNotifyMessageW
RegisterDeviceNotificationW
GetClientRect
GetSysColor
CallNextHookEx
SetWindowPos
MapWindowPoints
EndPaint
SendInput
MessageBoxA
GetTaskmanWindow
GetQueueStatus
IsWindow
UnhookWindowsHookEx
GetParent
CreateWindowExA
ShowWindow
GetPropA
BeginPaint
FillRect
ClientToScreen
SetPropA
SetCursor
DispatchMessageA
LoadStringA
OffsetRect
MsgWaitForMultipleObjects
GetWindowRect
LoadIconA
EnableWindow
InternetSetOptionW
InternetCloseHandle
InternetOpenW
sICEsYfI
drukal
eUQJMVA
EHGGU
kefNSAD
WkIdRAfmr
JUyUB
NbuDTQMA
FEDJsB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ