Fny
Fzm
Gye
Jaj
Mfk
Mnc
Qwh
Tqp
Vam
Vgv
Xbn
Xqd
Ygl
Static task
static1
Behavioral task
behavioral1
Sample
398806ae5cf05c49d5c6d6428b84aa199ce74132f34ca56720bbab8a6b524f1e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
398806ae5cf05c49d5c6d6428b84aa199ce74132f34ca56720bbab8a6b524f1e.dll
Resource
win10v2004-20220901-en
Target
398806ae5cf05c49d5c6d6428b84aa199ce74132f34ca56720bbab8a6b524f1e
Size
127KB
MD5
201b11c6ca4a4c0992a69c64f04ec041
SHA1
40cf7f927841c364f910e774cf9e08d5b0bb10b6
SHA256
398806ae5cf05c49d5c6d6428b84aa199ce74132f34ca56720bbab8a6b524f1e
SHA512
6c2a4d9710e23cb1639a81e39b9b51759f60c7a37c69c316a29f76e45a7716c0dcdb169976ecb5d60ce68158e4c88c882f86291c54ce8d700c76924f2d79c3f4
SSDEEP
3072:TGtE1FAjjZLYliNZBuBF7N9PJHkV0KMMiU1m9:Tv1SZLYlcZQBlb1kV0KNP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VariantCopyInd
VariantClear
SysFreeString
SysAllocStringLen
LoadTypeLib
ControlService
StartServiceA
OpenProcessToken
SetSecurityDescriptorDacl
QueryServiceStatus
WriteFmtUserTypeStg
GetRunningObjectTable
GetConvertStg
CoDisconnectObject
CreateDataAdviseHolder
CreateBindCtx
CoTaskMemAlloc
CoGetMalloc
CoGetClassObject
SetCursor
MessageBoxIndirectA
DrawIcon
DefDlgProcA
ShowOwnedPopups
SHGetFileInfoA
SHBindToParent
SHFileOperationA
PathFindExtensionA
PathCompactPathExA
PathCanonicalizeA
PathIsDirectoryA
PathQuoteSpacesA
PathUnquoteSpacesA
time
strstr
sprintf
memchr
rand
fflush
malloc
vsprintf
TlsSetValue
lstrcatA
lstrcpyA
RaiseException
LocalAlloc
GetDateFormatA
FreeResource
FlushFileBuffers
EnumResourceLanguagesA
ReadFile
Fny
Fzm
Gye
Jaj
Mfk
Mnc
Qwh
Tqp
Vam
Vgv
Xbn
Xqd
Ygl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ