TitleAlert
TitleCleanMultithreading
TitleProgramming
TitleStartSNMP
TitleThumbnail
TitleUtility
TitleWizard
Static task
static1
Behavioral task
behavioral1
Sample
acc5b84367952d2991cbee81341f0ce194c025de2bb32d2769cc6b08c827b474.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acc5b84367952d2991cbee81341f0ce194c025de2bb32d2769cc6b08c827b474.dll
Resource
win10v2004-20220812-en
Target
acc5b84367952d2991cbee81341f0ce194c025de2bb32d2769cc6b08c827b474
Size
143KB
MD5
6252876cc6c4800aab4f338f7501a460
SHA1
6564b7c9525dd4c8b8ec8b73d374728f8ae03377
SHA256
acc5b84367952d2991cbee81341f0ce194c025de2bb32d2769cc6b08c827b474
SHA512
ab83b987c2254c718619b1ad9ea7bb67922ede848face124dc54df22ff1c63e1fb60ede5b0494b3dda69b84ceeb50fea25b8522557ea731ced2939cce3137b41
SSDEEP
1536:SbCNWR6y82yP4qGlJIlrf8CIzjs0G6Hk10lreR+RFCMMCNj44xNXhJ6pKCOeZ:SbCS6wyPaP0r3rU3Q+RFCMMCZ44rmdR
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SendMessageA
RemoveMenu
CharLowerA
SetWindowWord
CopyRect
EnumDesktopWindows
EnumWindows
InsertMenuA
IsCharAlphaA
GetKeyState
ModifyMenuA
SetUserObjectInformationW
LoadMenuIndirectA
CreateAcceleratorTableW
EnumDesktopsW
MessageBoxExW
SetMenuItemBitmaps
SetCursor
DrawMenuBar
AppendMenuA
ShowCaret
InsertMenuItemA
CreateMenu
CreateCursor
ActivateKeyboardLayout
DestroyMenu
GetKeyNameTextA
DeleteMenu
CharNextA
UnhookWindowsHook
BeginPaint
EnumDisplayDevicesW
CreateDesktopW
ChangeMenuA
IsWindowUnicode
CharLowerW
LoadImageA
wvsprintfA
InitiateSystemShutdownW
SetServiceStatus
LogonUserW
RegRestoreKeyA
CryptReleaseContext
RegUnLoadKeyW
LookupAccountSidW
LookupPrivilegeNameW
AreAllAccessesGranted
DecryptFileA
DecryptFileW
AddAuditAccessAceEx
CryptGenKey
StartServiceA
GetServiceDisplayNameW
GetServiceKeyNameW
RegRestoreKeyW
DuplicateTokenEx
QueryServiceLockStatusA
RegFlushKey
CreateServiceA
LookupPrivilegeDisplayNameA
CryptDuplicateKey
LookupAccountSidA
GetSecurityDescriptorGroup
RegisterServiceCtrlHandlerA
GetCurrentHwProfileW
CryptHashData
GetUserNameA
ObjectDeleteAuditAlarmA
CryptEnumProviderTypesW
RegQueryInfoKeyW
LookupAccountNameW
CreatePrivateObjectSecurity
ord66
CreateIoCompletionPort
GetDriveTypeA
GlobalAddAtomA
lstrcatA
FindFirstVolumeMountPointW
FindFirstVolumeW
FindResourceA
WaitForSingleObjectEx
SwitchToFiber
IsProcessorFeaturePresent
GetLongPathNameW
GetSystemInfo
SetHandleCount
LCMapStringA
RemoveDirectoryA
IsValidLanguageGroup
WaitForDebugEvent
GetStringTypeExA
HeapAlloc
SetThreadLocale
CancelDeviceWakeupRequest
SetHandleInformation
CompareFileTime
FatalExit
GlobalAlloc
GetFileTime
GlobalFree
EndUpdateResourceA
ScrollConsoleScreenBufferW
GetConsoleMode
GetWriteWatch
GetSystemTime
LocalHandle
SetStdHandle
GetProcessAffinityMask
Sleep
GlobalHandle
GetModuleFileNameW
SetThreadPriorityBoost
MultiByteToWideChar
FindFirstVolumeW
SetCommMask
ReadFileScatter
GetPrivateProfileStructA
_lclose
UnregisterWait
VirtualAlloc
DeleteCriticalSection
FreeConsole
GetSystemDirectoryA
CreateMutexW
IsValidCodePage
GetTempFileNameW
EnumDateFormatsA
PathIsURLA
PathRenameExtensionW
PathIsPrefixA
PathIsPrefixW
SHSkipJunction
PathRenameExtensionA
PathFileExistsA
PathIsRootW
PathFileExistsW
PathIsRootA
TitleAlert
TitleCleanMultithreading
TitleProgramming
TitleStartSNMP
TitleThumbnail
TitleUtility
TitleWizard
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ