Export
importfunc
Static task
static1
Behavioral task
behavioral1
Sample
c1ab8105bf8607d7e50242b3a60a8bfd5d02783ce96bbb40b2877d7ed4ce6bca.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c1ab8105bf8607d7e50242b3a60a8bfd5d02783ce96bbb40b2877d7ed4ce6bca.dll
Resource
win10v2004-20220901-en
Target
c1ab8105bf8607d7e50242b3a60a8bfd5d02783ce96bbb40b2877d7ed4ce6bca
Size
216KB
MD5
1c48620ecc4f70243f0d0adb8b1a1ea1
SHA1
8da521280bb624fae5c4d4975df60b2bb98298e0
SHA256
c1ab8105bf8607d7e50242b3a60a8bfd5d02783ce96bbb40b2877d7ed4ce6bca
SHA512
aaa2f7dd88a2f9926e6c4bf096d0bb3376800f9486d3c9f2b334529c0dc55c738c6859efd80fc261ca91c3ff57ee5b08147e525d14a77907cec5ef7fb01dcabb
SSDEEP
3072:vWsBgjFuV3xI1jOqyz5OePpir2Z0M1gYVZlalmO5vXjL:pBgJIlWaZ0MTLlo
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
UnmapViewOfFile
ExitProcess
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
MoveFileExA
lstrlenA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
InterlockedDecrement
FindNextFileA
MapViewOfFile
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
LocalFree
FreeLibrary
LoadLibraryA
GetProcAddress
CreateFileA
SystemTimeToFileTime
SetFileTime
FindFirstFileA
FindClose
ReleaseMutex
CloseHandle
CreateMutexA
DeleteFileA
CopyFileA
GetVersionExA
GetWindowsDirectoryA
GetTempPathA
GetCurrentThreadId
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetSystemDirectoryA
GetModuleFileNameA
GetTickCount
GetLastError
GetComputerNameA
GetSystemTime
Sleep
GetExitCodeThread
TerminateThread
GetFileType
InitializeCriticalSection
GetCPInfo
GetOEMCP
IsBadCodePtr
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
HeapSize
HeapReAlloc
IsBadWritePtr
GetTimeZoneInformation
SetFilePointer
ReadFile
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
RtlUnwind
RaiseException
ExitThread
CreateThread
GetCommandLineA
GetSystemTimeAsFileTime
IsBadReadPtr
GetModuleHandleA
TerminateProcess
GetFileAttributesA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
PostMessageA
TranslateMessage
DispatchMessageA
GetMessageA
SetWindowTextA
MessageBoxA
KillTimer
FindWindowA
SetWindowPos
SystemParametersInfoA
EnumChildWindows
GetWindowThreadProcessId
PostThreadMessageA
SetTimer
EnumWindows
GetClassNameA
ControlService
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
CreateServiceA
RegCreateKeyA
SetServiceStatus
StartServiceA
QueryServiceStatus
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
DeleteService
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetFolderPathA
ShellExecuteA
CoCreateInstance
CoCreateGuid
CoInitializeEx
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
VariantInit
Netbios
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
GetProfilesDirectoryA
CreateURLMoniker
Export
importfunc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ