AddProcessInof
DelProcessInof
GetProcessInof
GetProcessInofCount
SetLookVer
SetProcessInof
Static task
static1
Behavioral task
behavioral1
Sample
79af401414cbd35dcfc7955f6d1acd2d60594f710fef04f79768169607934061.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79af401414cbd35dcfc7955f6d1acd2d60594f710fef04f79768169607934061.dll
Resource
win10v2004-20220812-en
Target
79af401414cbd35dcfc7955f6d1acd2d60594f710fef04f79768169607934061
Size
104KB
MD5
64dd1c2ecc9ae05b5287083c5ed62e82
SHA1
fb8bbe933a5ae3ac6c9f97478a08f6172f60f8e2
SHA256
79af401414cbd35dcfc7955f6d1acd2d60594f710fef04f79768169607934061
SHA512
11fefd5d666c3a71a8c8d60d74f5c3198e2cca6defadd9001b5d4544b8a294280c184787f10d11a8a3934747378554cbbabcb218823237775c766ba279a55910
SSDEEP
768:apD+oYlHPydeLEDelTeCRlIWU3gE8suRB4jH3NNSjyaXHMdQSixkwT+7aWw6empR:UaxLEKBZU3t8VA3NNSjzFXG7+tk6q
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameExA
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
MultiByteToWideChar
SetEndOfFile
GetCurrentProcessId
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
CreateThread
CreateFileA
GetFileSize
WriteFile
CloseHandle
ReadFile
WinExec
OpenProcess
WaitForSingleObject
Sleep
CreateMutexA
GetLastError
GetFileAttributesA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
WideCharToMultiByte
LCMapStringW
RaiseException
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapReAlloc
VirtualAlloc
LoadLibraryA
InitializeCriticalSection
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
AddProcessInof
DelProcessInof
GetProcessInof
GetProcessInofCount
SetLookVer
SetProcessInof
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ