Install
OffEvent
OnEvent
QueryStartSequence
StartFoo
StartMain
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
27fb6fdd2677d58d997c976fbed5c979cf7e7012cc14a08c5c91d63356de170d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
27fb6fdd2677d58d997c976fbed5c979cf7e7012cc14a08c5c91d63356de170d.dll
Resource
win10v2004-20220812-en
Target
27fb6fdd2677d58d997c976fbed5c979cf7e7012cc14a08c5c91d63356de170d
Size
584KB
MD5
ec69dac8375efec494c06d09a5a1a050
SHA1
272b9cebb01c141bbfeb849638914914fba7f307
SHA256
27fb6fdd2677d58d997c976fbed5c979cf7e7012cc14a08c5c91d63356de170d
SHA512
0ca6944d2659bc7c54532253551a1f5c24713702ceb4e8cfe680a3c2fffe0665d56cca39471b1960cb954f1f37eca19cf4a6b7505a3f0c0aea593114fd623bc7
SSDEEP
12288:1L+ZN7Ek0n/2vXubG8j6GOsG0EeqQB8TxIyaQkkP2SmY3qG59oif7jv1Vy/sNvmx:1L+Z+kM/eqCoA7OEdmST9NM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHGetFolderPathA
InternetQueryOptionA
InternetCloseHandle
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetOpenUrlA
HttpQueryInfoA
InternetCanonicalizeUrlA
InternetGetCookieA
InternetReadFile
InternetSetOptionA
InternetCrackUrlA
HttpSendRequestA
gethostname
PathFileExistsA
StrRChrA
StrChrA
StrStrIA
SHDeleteKeyA
GetStringTypeA
GetStartupInfoA
GetFileType
GetStdHandle
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
lstrlenA
CompareStringA
CompareStringW
LeaveCriticalSection
EnterCriticalSection
CreateThread
CreateEventA
GetVolumeInformationA
OpenMutexA
Sleep
ReleaseMutex
FlushFileBuffers
CreateFileA
CreateMutexA
SetUnhandledExceptionFilter
lstrcpynA
LocalFree
SetLastError
GetCurrentProcess
SetEndOfFile
WriteFile
SetFilePointer
ReadFile
GetFileSize
GetWindowsDirectoryA
VirtualFreeEx
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetModuleFileNameA
Process32Next
Process32First
lstrcpyA
CreateToolhelp32Snapshot
FreeLibrary
GetCurrentProcessId
LoadLibraryA
IsBadReadPtr
GetStringTypeW
Module32First
CreateDirectoryA
GetFileTime
SetFileAttributesA
CompareFileTime
ResetEvent
VirtualAlloc
CreateProcessA
GetShortPathNameA
FreeLibraryAndExitThread
ExitProcess
VirtualFree
SuspendThread
ResumeThread
GetCurrentThreadId
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
OpenEventA
CreateFileMappingA
TerminateProcess
GetTickCount
DeleteFileA
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
FindClose
FindNextFileA
FindFirstFileA
GetDiskFreeSpaceExA
GetDriveTypeA
GetLogicalDriveStringsA
lstrcatA
SetStdHandle
ExpandEnvironmentStringsA
InterlockedIncrement
InterlockedDecrement
GetTempPathA
MoveFileA
GetSystemDirectoryA
VirtualProtect
FlushInstructionCache
SetHandleCount
GetTimeZoneInformation
GetOEMCP
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
QueryPerformanceCounter
IsBadWritePtr
HeapCreate
GetCPInfo
LCMapStringW
LCMapStringA
GetCommandLineA
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
RtlUnwind
VirtualQuery
GetSystemInfo
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadCodePtr
GetLocaleInfoW
SetEnvironmentVariableA
LocalAlloc
Module32Next
GetFileAttributesA
HeapDestroy
GetKeyboardLayoutList
GetKeyboardLayout
ActivateKeyboardLayout
GetKeyboardLayoutNameA
wvsprintfA
GetCursorPos
MessageBoxA
CreateWindowExA
UnhookWindowsHookEx
GetMessageA
PostMessageA
DefWindowProcA
CallNextHookEx
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
LoadStringA
SetPropA
SetWindowLongA
RegQueryInfoKeyA
RegDeleteKeyA
RegOpenKeyExA
SetNamedSecurityInfoA
RegDeleteValueA
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
SetEntriesInAclA
SetSecurityInfo
RegFlushKey
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegEnumKeyExA
RegEnumValueA
SHGetSpecialFolderPathA
ShellExecuteA
CoCreateGuid
OleRun
CoInitialize
CoCreateInstance
VariantInit
VariantClear
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SysAllocString
Install
OffEvent
OnEvent
QueryStartSequence
StartFoo
StartMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ