ActionOfACluster
ComputerInActionIsWhether
OSRunningOS
Static task
static1
Behavioral task
behavioral1
Sample
03fe5a90843c9bf40d63f8614057175cb80edc0c9671b40a304869a9876d9255.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
03fe5a90843c9bf40d63f8614057175cb80edc0c9671b40a304869a9876d9255.dll
Resource
win10v2004-20220812-en
Target
03fe5a90843c9bf40d63f8614057175cb80edc0c9671b40a304869a9876d9255
Size
400KB
MD5
4c4560da5b64cecdbbc7c1b7734e3000
SHA1
66c5ac4a5e9a6907b934bbf30d6e99c2a36d3e42
SHA256
03fe5a90843c9bf40d63f8614057175cb80edc0c9671b40a304869a9876d9255
SHA512
1abb2fd04c52ea925bccdcf38bfe439bf10e62c31fa7415d27288f88752e3c69433558891770bb2589f434fa7764e3c8c2f79845555f298d584fb4822dbbee04
SSDEEP
12288:2uiW+x87s5lXl2yU36PUVFp7Ws8WGYUAsw:biW3gNLU2Uss8
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetVersion
GetSystemWindowsDirectoryW
ResetEvent
CompareStringA
GetCPInfo
IsDBCSLeadByte
GetModuleFileNameA
GetFileAttributesA
HeapReAlloc
SearchPathW
GetSystemDefaultUILanguage
GetVersionExW
GetStringTypeW
LoadResource
SizeofResource
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
QueryPerformanceCounter
OpenFileMappingW
GetEnvironmentVariableW
FlushViewOfFile
CreateFileMappingW
CreateDirectoryW
Sleep
FindFirstFileW
FindNextFileW
FindClose
GetSystemInfo
MapViewOfFile
UnmapViewOfFile
TzSpecificLocalTimeToSystemTime
MultiByteToWideChar
GetNumberFormatW
GetSystemDirectoryW
GetModuleFileNameW
WideCharToMultiByte
SystemTimeToFileTime
GlobalAlloc
GlobalFree
DisableThreadLibraryCalls
TlsAlloc
HeapFree
SetEvent
HeapAlloc
FreeLibrary
FileTimeToSystemTime
CompareFileTime
GetDateFormatW
SetLastError
GetThreadLocale
CompareStringW
GetUserDefaultLCID
GetLocalTime
GetTickCount
CreateMutexW
WaitForSingleObject
ReleaseMutex
EnterCriticalSection
GetCalendarInfoW
LocalAlloc
LocalFree
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleW
GetCurrentThread
GetFileAttributesW
SetErrorMode
LocalReAlloc
WriteFile
ReadFile
SetFilePointerEx
SetFilePointer
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
DuplicateHandle
lstrcpyA
GetLogicalDrives
TerminateProcess
GetCurrentProcess
GetLastError
GetLocaleInfoW
GetEnvironmentStrings
GetEnvironmentVariableA
GetModuleHandleA
CreateEventW
CloseHandle
FlushInstructionCache
OutputDebugStringA
GlobalLock
GetCommandLineW
GetFullPathNameW
VirtualAlloc
CreateActCtxW
ReleaseActCtx
ActivateActCtx
VirtualFree
VirtualProtect
GetProcessHeap
GetComputerNameW
GetSysColor
GetSysColorBrush
RegisterClipboardFormatW
DefWindowProcW
SetWindowTextW
SetForegroundWindow
CharPrevA
CharNextA
LoadStringW
CharLowerW
FindWindowExW
UnhookWindowsHookEx
CallNextHookEx
ScreenToClient
GetClientRect
GetSubMenu
DestroyWindow
GetDlgCtrlID
MsgWaitForMultipleObjects
GetParent
SetWindowsHookExW
LoadImageW
LoadBitmapW
SetFocus
GetTopWindow
GetWindowTextLengthA
GetFocus
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
GetWindowThreadProcessId
MapWindowPoints
LoadMenuW
KillTimer
RegOpenKeyExW
GetLengthSid
EqualPrefixSid
ConvertStringSidToSidW
RegQueryValueExW
RegCloseKey
RegOpenKeyExA
RegDeleteValueW
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegEnumKeyExW
SHGetPathFromIDListW
SHGetMalloc
CoRegisterInitializeSpy
CreateStreamOnHGlobal
StgOpenStorageOnILockBytes
CoFileTimeNow
StringFromGUID2
CLSIDFromString
PropVariantCopy
PropVariantClear
CoGetMalloc
CoCreateFreeThreadedMarshaler
CoRevokeInitializeSpy
ReleaseStgMedium
StringFromCLSID
CoTaskMemAlloc
CoTaskMemFree
towlower
free
malloc
wcstoul
wcstod
wcstol
wcschr
iswalpha
memmove
iswalnum
qsort
realloc
bsearch
iswpunct
PathAddBackslashW
PathFindFileNameW
UuidCreate
ActionOfACluster
ComputerInActionIsWhether
OSRunningOS
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ