EmptyStub
GetModuleIntf
InitializeEx
SendReport
SendReportA
SendReportW
TryRestartAppWithWaitToTerminate
TryRestartAppWithWaitToTerminateA
TryRestartAppWithWaitToTerminateW
Static task
static1
Behavioral task
behavioral1
Sample
a6d2f6261c908d3b1e7bdaf36514221c41af7927fbbf68d076c8c7131a2862b0.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a6d2f6261c908d3b1e7bdaf36514221c41af7927fbbf68d076c8c7131a2862b0.dll
Resource
win10v2004-20220901-en
Target
a6d2f6261c908d3b1e7bdaf36514221c41af7927fbbf68d076c8c7131a2862b0
Size
923KB
MD5
44d03636a382a8bd21f4242d8bb493d0
SHA1
5b424687c504ac2a57c3798539bf6ba78c237370
SHA256
a6d2f6261c908d3b1e7bdaf36514221c41af7927fbbf68d076c8c7131a2862b0
SHA512
32a31a1cb85bbef31e6ca3e5e4be754086c0276b15ce1cd438a1021f95f9644be190a4bb36f95a43ce5ea5d6938d000c8daba699a14df94ffd6d64d557b2ff89
SSDEEP
6144:+Dk8wdeOT15oyKimlzSv0XNmSpm1i3qNkrJZ7lBcs4ZEILHfcG:ik8sAxTGksZV7cG
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
CreateFileMappingA
OpenProcess
MapViewOfFile
TerminateProcess
UnmapViewOfFile
VirtualFree
VirtualAlloc
IsBadCodePtr
GetSystemTime
CopyFileA
ReadFile
CreateEventA
ResetEvent
GetExitCodeThread
GetThreadContext
GetCurrentThread
SetThreadContext
GetCurrentThreadId
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsBadHugeReadPtr
IsBadHugeWritePtr
IsBadStringPtrA
IsBadStringPtrW
IsBadWritePtr
ExitThread
LoadLibraryExA
IsDBCSLeadByte
lstrlenW
VirtualQuery
FindResourceA
SizeofResource
TlsGetValue
CompareStringA
TlsSetValue
CompareStringW
LoadResource
GetStringTypeExA
lstrcmpiA
DisableThreadLibraryCalls
InterlockedExchange
TlsAlloc
SuspendThread
lstrlenA
ResumeThread
TlsFree
GetCommandLineW
EnterCriticalSection
CreateEventW
LeaveCriticalSection
SetEnvironmentVariableW
CreateProcessW
WaitForMultipleObjects
OpenEventW
RaiseException
GetFullPathNameW
SystemTimeToFileTime
CompareFileTime
GetTempFileNameA
GetFileAttributesA
GetSystemInfo
lstrcpyA
lstrcatA
FindFirstFileA
FindNextFileA
FindClose
GetComputerNameA
FormatMessageA
GlobalMemoryStatus
LocalFree
GlobalAlloc
GlobalFree
GetDateFormatA
GetVersionExA
GetTimeFormatA
GetSystemDirectoryA
GetWindowsDirectoryA
SetFilePointer
GetLocalTime
GetTimeZoneInformation
GetDriveTypeA
GetDiskFreeSpaceExA
GetFileSize
CreateRemoteThread
TerminateThread
DuplicateHandle
GetFileAttributesExA
FileTimeToSystemTime
LocalAlloc
ReadProcessMemory
ExpandEnvironmentStringsA
OpenMutexA
ReleaseMutex
OpenEventA
MapViewOfFileEx
PulseEvent
GetCurrentDirectoryA
GetFullPathNameA
VirtualProtect
GetProcessHeap
HeapFree
HeapAlloc
GetLogicalDriveStringsW
GetDriveTypeW
GetVolumeInformationW
QueryDosDeviceW
GetSystemTimeAsFileTime
LockResource
GlobalLock
GlobalUnlock
FlushInstructionCache
FindResourceExA
FreeResource
GlobalHandle
lstrcmpA
MulDiv
HeapSize
HeapReAlloc
HeapDestroy
IsProcessorFeaturePresent
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
GetCommandLineA
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
HeapCreate
GetStdHandle
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetLocaleInfoW
SetStdHandle
WriteConsoleA
ExitProcess
GetExitCodeProcess
RemoveDirectoryA
CreateDirectoryA
IsDebuggerPresent
CreateThread
WaitForSingleObject
GetEnvironmentVariableA
GetEnvironmentVariableW
IsBadReadPtr
LoadLibraryA
GetTempPathA
FreeLibrary
GetTempPathW
GetModuleFileNameA
CreateFileA
CloseHandle
SetEvent
CreateProcessA
WriteFile
MultiByteToWideChar
DeleteFileA
SetLastError
GetFileAttributesW
GetVersion
GetCurrentProcess
GetProcAddress
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameW
LoadLibraryExW
LoadLibraryW
WideCharToMultiByte
GetLastError
DeleteCriticalSection
InitializeCriticalSection
OutputDebugStringA
GetModuleHandleW
GetCurrentProcessId
CreateFileW
SetEndOfFile
SetEnvironmentVariableA
Sleep
FileTimeToLocalFileTime
GetConsoleOutputCP
WriteConsoleW
TrackPopupMenu
SetFocus
GetAsyncKeyState
ReleaseCapture
SetScrollPos
GetCapture
GetMessagePos
DestroyCaret
CreateCaret
CloseClipboard
SetCaretPos
SetClipboardData
OffsetRect
InflateRect
EmptyClipboard
OpenClipboard
SetScrollInfo
GetScrollInfo
SetCapture
HideCaret
DragDetect
ShowCaret
DefWindowProcA
EndPaint
UnregisterClassA
DrawTextA
DestroyIcon
wsprintfA
IsChild
GetIconInfo
GetCursorInfo
GetDesktopWindow
EnumWindows
GetCursorPos
GetWindowThreadProcessId
PtInRect
GetKeyboardLayoutList
CharUpperW
CharUpperA
CharLowerA
PostMessageA
MessageBoxA
FillRect
GetWindowTextA
EnableMenuItem
GetFocus
ClientToScreen
ReleaseDC
GetSystemMetrics
DrawTextExA
DrawTextExW
GetDC
IsWindowUnicode
ShowWindow
MoveWindow
GetWindowInfo
GetClientRect
DialogBoxParamA
DestroyWindow
SetDlgItemTextA
DeleteMenu
RegisterClassExA
AppendMenuA
SetWindowContextHelpId
CreateDialogParamA
SetMenuDefaultItem
MapDialogRect
DestroyAcceleratorTable
LoadIconA
GetWindow
GetMenuItemInfoA
SetMenuItemInfoA
InvalidateRgn
CreateWindowExA
IsWindowVisible
ScrollWindowEx
SystemParametersInfoA
GetClassNameA
UpdateWindow
MapWindowPoints
RedrawWindow
CreateAcceleratorTableA
GetMenuItemCount
CopyImage
CreateDialogIndirectParamA
GetScrollBarInfo
GetMenuItemID
AdjustWindowRectEx
GetKeyState
GetWindowTextLengthA
GetSubMenu
CheckMenuRadioItem
RegisterWindowMessageA
LoadMenuA
IsDialogMessageA
LoadImageA
GetClassInfoExA
DestroyMenu
DrawIcon
InvalidateRect
LoadStringA
SetDlgItemTextW
SetWindowTextA
GetDlgItemTextA
ScreenToClient
SetWindowLongA
CallWindowProcA
LoadCursorA
SetCursor
GetSysColor
GetParent
GetDlgCtrlID
GetWindowLongA
GetSysColorBrush
EndDialog
SetWindowPos
IsWindow
SendMessageA
GetWindowRect
GetDlgItem
EnableWindow
GetActiveWindow
CharNextA
BeginPaint
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteKeyA
RegQueryValueA
RegQueryInfoKeyA
RegDeleteValueA
FreeSid
GetUserNameA
RegEnumValueA
AllocateAndInitializeSid
CheckTokenMembership
CloseServiceHandle
LookupPrivilegeNameW
LookupPrivilegeDisplayNameW
GetTokenInformation
GetLengthSid
CopySid
GetSidIdentifierAuthority
OpenProcessToken
GetSidSubAuthorityCount
GetSidSubAuthority
LookupPrivilegeValueA
PrivilegeCheck
AdjustTokenPrivileges
LookupAccountSidW
GetUserNameW
RegOpenKeyA
SHFileOperationA
ExtractIconExA
CoGetClassObject
CoUninitialize
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
StringFromGUID2
CoCreateGuid
CoTaskMemFree
StringFromCLSID
OleInitialize
CLSIDFromString
OleLockRunning
OleUninitialize
CLSIDFromProgID
SafeArrayGetElemsize
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysFreeString
SysAllocStringLen
SysStringLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VariantClear
VariantInit
SafeArrayGetElement
SafeArrayUnlock
SafeArrayLock
SafeArrayPutElement
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayCreate
VarUI4FromStr
PathFileExistsA
PathParseIconLocationA
PathFindExtensionW
PathFindFileNameA
PathFindExtensionA
connect
htons
gethostbyname
closesocket
send
WSACleanup
WSAStartup
gethostname
recv
select
sendto
recvfrom
socket
EmptyStub
GetModuleIntf
InitializeEx
SendReport
SendReportA
SendReportW
TryRestartAppWithWaitToTerminate
TryRestartAppWithWaitToTerminateA
TryRestartAppWithWaitToTerminateW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ