gRaInst
gRaRun
gRaShutdown
gRaStartup
gRaTest
Static task
static1
Behavioral task
behavioral1
Sample
a406cc1f788cab810d95f6afd39bc709f5277f1a555db8c2ac07c3bb0ea12fb6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a406cc1f788cab810d95f6afd39bc709f5277f1a555db8c2ac07c3bb0ea12fb6.dll
Resource
win10v2004-20220901-en
Target
a406cc1f788cab810d95f6afd39bc709f5277f1a555db8c2ac07c3bb0ea12fb6
Size
33KB
MD5
0d0085ce185fb465c34432c4649f4810
SHA1
6652c609b3a33e8057dd32def73ac8ce46075daf
SHA256
a406cc1f788cab810d95f6afd39bc709f5277f1a555db8c2ac07c3bb0ea12fb6
SHA512
b0f704be3d8fe9996e205a41dfa545acd71efae476ca1d203fb958080390285345a4ac460a4f14f57ec98afffab453972344082f4fb954cb0b7ec4494bc9ddb1
SSDEEP
768:/SfVUC/UbkJP10D8IWzsJiVlpsxBWNGNSJ:/SfVj/EkrKpgsCd
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CreateProcessA
GetTempPathA
lstrlenA
GetSystemTime
lstrcatA
lstrcpynA
CreateThread
GetLastError
WaitForSingleObject
lstrcmpA
CreateEventA
GetLocaleInfoA
MoveFileExA
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
SystemTimeToFileTime
GetCurrentThreadId
GetVersionExA
SetEvent
lstrcmpiA
GetProcAddress
VirtualAlloc
lstrcpyA
VirtualFree
GetWindowsDirectoryA
CreateFileA
GetFileSize
WritePrivateProfileStringA
OpenProcess
MoveFileA
GetVolumeInformationA
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
HeapAlloc
DeleteFileA
HeapFree
GetProcessHeap
GetThreadContext
SetThreadContext
VirtualQueryEx
GlobalAlloc
TerminateProcess
GlobalFree
ResumeThread
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
VirtualQuery
RtlUnwind
GetVersion
Sleep
ExitProcess
CloseHandle
CreateMutexA
GetModuleFileNameA
WriteFile
FindAtomA
GetLocalTime
LoadLibraryA
GetTickCount
IsDebuggerPresent
GetThreadDesktop
SetThreadDesktop
CloseDesktop
OpenInputDesktop
FindWindowExA
FindWindowA
DispatchMessageA
GetMessageA
GetWindowThreadProcessId
GetWindowRect
CreateWindowExA
RegisterClassExA
DefWindowProcA
SetWindowsHookExA
GetFocus
GetCursorPos
EqualRect
TranslateMessage
IsWindowVisible
InflateRect
LoadCursorA
LoadIconA
CallNextHookEx
GetCaretPos
PostMessageA
wsprintfA
ClientToScreen
RegEnumValueA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
CreateProcessAsUserA
RegQueryValueExA
OpenProcessToken
RegDeleteKeyA
SHDeleteValueA
SHSetValueA
SHGetValueA
SHDeleteKeyA
gRaInst
gRaRun
gRaShutdown
gRaStartup
gRaTest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ