DealA
DealB
DealC
Static task
static1
Behavioral task
behavioral1
Sample
f77fe960ab46a7804eb135a703dde43882f50b157b682d89227199698f74f8ba.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f77fe960ab46a7804eb135a703dde43882f50b157b682d89227199698f74f8ba.dll
Resource
win10v2004-20220812-en
Target
f77fe960ab46a7804eb135a703dde43882f50b157b682d89227199698f74f8ba
Size
185KB
MD5
0dc6890130dbfdf7e3acb7a49859dbf0
SHA1
e61a4adf3d9295dfe2900ae1116a02238a40c89e
SHA256
f77fe960ab46a7804eb135a703dde43882f50b157b682d89227199698f74f8ba
SHA512
504ebf6535d9291976bf6c4fd6d43a9db462c715bee12438549ba220fb7a5f408a950dfdd051d13cdde82b07b3a4233476796b4ff5e4d17c4270af3894df2546
SSDEEP
3072:SFp4xcnRD+W+yi3wYlbck95hUxqvnK3lPgPQJiokcP0WSOiuUE:SFplnRD+ly0wYeShUU/K3WMJkk0WvWE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Xlen@std@@YAXXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IPBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
SHSetValueA
SHGetValueA
SHDeleteValueA
strtok
_mkdir
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
_initterm
_adjust_fdiv
longjmp
__CxxLongjmpUnwind
_setjmp3
??1type_info@@UAE@XZ
wprintf
strncmp
_CxxThrowException
_stat
_strnicmp
_strlwr
time
__CxxFrameHandler
??2@YAPAXI@Z
strrchr
getenv
rand
srand
fwrite
fread
fclose
ftell
fseek
_stricmp
fopen
_access
sprintf
atoi
strstr
malloc
free
vsprintf
mktime
localtime
_mbsnbicmp
rename
_snprintf
printf
memmove
sscanf
atol
wcslen
wcscat
wcscpy
strncpy
isspace
abort
strchr
strftime
WSAStartup
sendto
socket
bind
recvfrom
htons
gethostname
gethostbyname
ntohl
inet_addr
ntohs
GetAdaptersInfo
RasGetEntryDialParamsA
RasEnumEntriesA
RasEnumConnectionsA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
SetupDiCallClassInstaller
SetupDiSetClassInstallParamsA
Netbios
GetUserNameA
LookupAccountNameA
ConvertSidToStringSidW
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
RegConnectRegistryA
RegOpenKeyA
RegEnumKeyA
StartServiceA
CreateServiceA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
OpenSCManagerA
RegOpenKeyExW
RegQueryValueExW
OpenServiceA
ControlService
CloseServiceHandle
DeleteService
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumValueA
GetSystemMetrics
CloseDesktop
CloseWindowStation
ReleaseDC
GetDC
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
wsprintfW
IsCharAlphaNumericA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
CreateWindowExA
RegisterClassExA
SendMessageA
SetClipboardViewer
wsprintfA
ChangeClipboardChain
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseClipboard
GetWindowTextA
GetForegroundWindow
GetClipboardData
OpenClipboard
GetPriorityClipboardFormat
DefWindowProcA
PostQuitMessage
GetErrorInfo
VariantClear
VariantInit
CreateMutexA
GetModuleFileNameA
OutputDebugStringA
SetFileTime
LocalFileTimeToFileTime
GetFileTime
GetCurrentThreadId
GetExitCodeThread
WritePrivateProfileStringA
GetSystemDirectoryW
GetVolumeInformationW
GetDiskFreeSpaceExW
GetLogicalDrives
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetDriveTypeA
FileTimeToLocalFileTime
SetFileAttributesA
lstrcatA
lstrcpyA
SetFilePointer
GetWindowsDirectoryA
FindNextFileA
FindClose
GetCurrentProcessId
GetCurrentThread
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetSystemDefaultLCID
GetEnvironmentVariableA
WideCharToMultiByte
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedCompareExchange
OpenProcess
TerminateProcess
CreatePipe
GetStartupInfoA
GetVersionExA
GetSystemDirectoryA
MoveFileExA
GetModuleHandleW
TerminateThread
LocalFree
LocalAlloc
lstrlenA
SetLastError
WriteFile
CreateFileW
MultiByteToWideChar
GetProcAddress
InterlockedIncrement
InterlockedDecrement
GetLocalTime
GetTempPathA
GetTickCount
FindFirstFileA
CopyFileA
DeleteFileA
MoveFileA
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
CloseHandle
CreateProcessA
Sleep
GetLastError
InterlockedExchange
FreeLibrary
SizeofResource
LockResource
LoadResource
FindResourceA
FileTimeToSystemTime
CreateThread
GlobalAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
DeviceIoControl
GetFileSize
ReadFile
CreateFileA
SystemTimeToFileTime
LoadLibraryA
ord800
ord535
ord860
ord540
ord6877
ord2818
ord858
ord924
ord4129
ord5683
ord537
GetStockObject
SelectPalette
RealizePalette
GetDIBits
DeleteObject
DeleteDC
GetPixel
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDeviceCaps
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetPathFromIDListA
StgOpenStorage
StgIsStorageFile
CoUninitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
DealA
DealB
DealC
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ