CloseFeed
GetPort
IsReadyToRead
OpenFeed
ReadData
RunScript
SendData
WSAStart
Static task
static1
Behavioral task
behavioral1
Sample
000e76c6ab657d45773bc231fc85f3792c12440c9783399e00cb1aa5bd1026c6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
000e76c6ab657d45773bc231fc85f3792c12440c9783399e00cb1aa5bd1026c6.dll
Resource
win10v2004-20220812-en
Target
000e76c6ab657d45773bc231fc85f3792c12440c9783399e00cb1aa5bd1026c6
Size
306KB
MD5
6d45de49ee9eacd3e2248d64c2da643b
SHA1
319ed690e6a4cefd29f3d7b58e143dfccfafc3e9
SHA256
000e76c6ab657d45773bc231fc85f3792c12440c9783399e00cb1aa5bd1026c6
SHA512
77f6ec23cf88eee8c9db89a35269df20a769a542e5bf849475786d86e200f102148dc4bbf994efb2484cc54ad6f9da875706c353245acaca21f7030a15c4f2b9
SSDEEP
6144:RByYYFR1g5/ZgWU9YIBDJu8GiUeDO0K1MNUdcDyAQ8C/NY4:YFR1gMKGDUA41MNqgu8gY4
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SHFileOperationA
SHChangeNotify
SHCreateProcessAsUserW
RpcBindingFree
RpcBindingCopy
CoTaskMemFree
CoTaskMemAlloc
FindFileInPath
ImagehlpApiVersion
FindDebugInfoFile
ImageRvaToSection
ImageNtHeader
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
CloseClipboard
CloseDesktop
CharNextA
CloseWindow
CloseWindowStation
GetDC
GetKeyboardLayout
GetKeyboardLayoutList
GetMenuCheckMarkDimensions
GetMonitorInfoA
GetSysColor
GetSystemMetrics
ReleaseDC
CharPrevA
DeleteFileW
EnterCriticalSection
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetProcessTimes
GetShortPathNameA
GetStringTypeExW
DeleteCriticalSection
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalMemoryStatus
HeapAlloc
HeapCreate
CreateSemaphoreA
HeapFree
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetFileAttributesW
SetLastError
SetLocalTime
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
CreateMutexA
CreateFileW
CreateDirectoryW
HeapDestroy
CloseHandle
GetSystemDefaultLCID
ConvertStringSecurityDescriptorToSecurityDescriptorW
FreeSid
ConvertSidToStringSidA
CheckTokenMembership
AllocateAndInitializeSid
AddAccessDeniedAce
AddAccessAllowedAce
GetLengthSid
UnregisterTraceGuids
TraceEvent
SetSecurityDescriptorDacl
RegisterTraceGuidsA
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyExA
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
OpenThreadToken
OpenProcessToken
IsValidSid
InitializeSecurityDescriptor
InitializeAcl
GetTraceLoggerHandle
GetTraceEnableLevel
GetTokenInformation
GetSecurityDescriptorDacl
CopySid
StrChrA
PathFileExistsA
StrCmpNA
ChrCmpIA
DeleteObject
DeleteDC
CreateSolidBrush
GetDeviceCaps
CreateDCA
ord9
CloseFeed
GetPort
IsReadyToRead
OpenFeed
ReadData
RunScript
SendData
WSAStart
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ