Export
importfunc
Static task
static1
Behavioral task
behavioral1
Sample
f4d597521436114486d47ad28c4dd89fb86521cab57495d662e8bd8a10a6bfe4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f4d597521436114486d47ad28c4dd89fb86521cab57495d662e8bd8a10a6bfe4.dll
Resource
win10v2004-20220812-en
Target
f4d597521436114486d47ad28c4dd89fb86521cab57495d662e8bd8a10a6bfe4
Size
249KB
MD5
67c753402a58048de25eee9d25b03940
SHA1
5f1a3c9494cb15c3b5627e153c74ed58f373bf6d
SHA256
f4d597521436114486d47ad28c4dd89fb86521cab57495d662e8bd8a10a6bfe4
SHA512
74b78e9ce026577d40894a3b95a8e9ba610b77217c3bb885eb391cd7a62439fb318528c6ff2d0fa6a348e9e1fbcf63b333a0b76805f4f48203195f0f31bd5768
SSDEEP
3072:+jvypwDivNktEvTW63O0MZ4Vgh08POYYziUorNZOwNeBSe/XWXsydfzbPfKlOhQ6:+ypuwz7E4VghrU+NZMB7/2sydffg0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
UnmapViewOfFile
ExitProcess
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
MoveFileExA
lstrlenA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
InterlockedDecrement
FormatMessageA
FindNextFileA
MapViewOfFile
LeaveCriticalSection
SetUnhandledExceptionFilter
WriteFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetEndOfFile
SetConsoleCtrlHandler
FlushFileBuffers
SetStdHandle
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
LocalFree
FreeLibrary
LoadLibraryA
GetProcAddress
CreateFileA
SystemTimeToFileTime
SetFileTime
FindFirstFileA
FindClose
ReleaseMutex
CloseHandle
DeleteFileA
CopyFileA
CreateMutexA
GetVersionExA
GetWindowsDirectoryA
GetTempPathA
GetCurrentThreadId
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetSystemDirectoryA
GetModuleFileNameA
GetTickCount
GetLastError
GetComputerNameA
GetSystemTime
Sleep
GetExitCodeThread
TerminateThread
UnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
IsBadCodePtr
InitializeCriticalSection
GetCPInfo
GetOEMCP
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsBadWritePtr
GetTimeZoneInformation
SetFilePointer
ReadFile
GetCurrentProcessId
QueryPerformanceCounter
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
EnterCriticalSection
GetCommandLineA
RaiseException
RtlUnwind
ExitThread
CreateThread
GetSystemTimeAsFileTime
IsBadReadPtr
GetModuleHandleA
TerminateProcess
GetFileAttributesA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FatalAppExitA
PostMessageA
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowTextA
MessageBoxA
KillTimer
FindWindowA
SetWindowPos
SystemParametersInfoA
EnumChildWindows
GetWindowThreadProcessId
PostThreadMessageA
SetTimer
EnumWindows
GetClassNameA
ControlService
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
RegDeleteValueA
RegDeleteKeyA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
CreateServiceA
RegCreateKeyA
SetServiceStatus
StartServiceA
QueryServiceStatus
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
DeleteService
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetFolderPathA
ShellExecuteA
CoCreateInstance
CoCreateGuid
CoInitializeEx
SysFreeString
SysAllocString
VariantClear
CreateErrorInfo
GetErrorInfo
VariantChangeType
SetErrorInfo
VariantInit
Netbios
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetSetOptionA
GetProfilesDirectoryA
CreateURLMoniker
Export
importfunc
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ