Compare
Dir
LookupError
SetVoidPtr
WriteObjectToFile
memcpy_check
Static task
static1
Behavioral task
behavioral1
Sample
99c088fac0d1260baa410226cac47547da534073e2e6e952b07b382d17143dfc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99c088fac0d1260baa410226cac47547da534073e2e6e952b07b382d17143dfc.dll
Resource
win10v2004-20220812-en
Target
99c088fac0d1260baa410226cac47547da534073e2e6e952b07b382d17143dfc
Size
592KB
MD5
7c67985e689dd55013568ece0a4de010
SHA1
5855814a5987999f1b6463737f337d9bc0f7ba65
SHA256
99c088fac0d1260baa410226cac47547da534073e2e6e952b07b382d17143dfc
SHA512
e1d7b259ab4585fe4f7995537033a06d0fd4e3a5f2413a2dd46673473b1ad7f419daf72412a6b870b6d970317e95416eac013fdd6a0cfcb861f24edf622eddbf
SSDEEP
12288:1cAchJOAqhQgCIF223j1ysQj6KfRFwoCnz2W8WxcD+tKlat:1cRh4AqVJFdpysQ9RFwoCnn1xYs
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CoUninitialize
CoTaskMemRealloc
CoInitialize
CoInitializeEx
CoCreateInstance
CoTaskMemAlloc
SysAllocString
SysStringLen
LoadTypeLi
VarUI4FromStr
SysFreeString
UnRegisterTypeLi
RegisterTypeLi
ShellExecuteW
RaiseException
GlobalFree
GetCurrentProcessId
LeaveCriticalSection
InterlockedDecrement
UnhandledExceptionFilter
FreeLibrary
WaitForSingleObject
VirtualAlloc
DeleteCriticalSection
Sleep
GetSystemTimeAsFileTime
GetTickCount
GetCurrentThreadId
InitializeCriticalSection
CloseHandle
LocalFree
GetModuleFileNameW
GlobalAlloc
SetUnhandledExceptionFilter
CreateMutexW
QueryPerformanceCounter
lstrcmpiW
GetModuleHandleW
GetDateFormatA
ReadFile
InterlockedIncrement
CreateFileW
GetModuleHandleA
LoadResource
GetVersionExA
DeviceIoControl
MultiByteToWideChar
TerminateProcess
GetLastError
InterlockedExchange
WideCharToMultiByte
EnterCriticalSection
lstrlenW
LocalAlloc
InterlockedCompareExchange
SetEvent
RegQueryInfoKeyW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
Compare
Dir
LookupError
SetVoidPtr
WriteObjectToFile
memcpy_check
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ