EvtShutdown
EvtStartup
inst
run
tes
Static task
static1
Behavioral task
behavioral1
Sample
97c4a96e79e4b71a354d77cc22aae0726a991dc18a09f5b798eec174c8742d91.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97c4a96e79e4b71a354d77cc22aae0726a991dc18a09f5b798eec174c8742d91.dll
Resource
win10v2004-20221111-en
Target
97c4a96e79e4b71a354d77cc22aae0726a991dc18a09f5b798eec174c8742d91
Size
17KB
MD5
39439808ecdfbcd0b2b60615a992d9ea
SHA1
2d3f1e545c284a14b0a561337f9fd6d982697fc2
SHA256
97c4a96e79e4b71a354d77cc22aae0726a991dc18a09f5b798eec174c8742d91
SHA512
e8ce4a3e04a6769604f91d9c1062f625647856fc746039612e7987b68eaa90f32fa2d27ece5b1e1b256231cafba49bc38ce27cb384064257b731d088f9721f32
SSDEEP
384:LFTVHjH9/CNTfJjGmkcYFlBnoqmSsY1jfJvspa1:39/iJjJkcYVojS/Bxv/
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetSystemTime
WriteFile
lstrcmpiA
GetProcAddress
VirtualAlloc
lstrcpyA
VirtualFree
CopyFileA
LoadLibraryA
OpenProcess
GetFileSize
lstrcmpA
CreateEventA
GetLocaleInfoA
GetModuleHandleA
CreateProcessA
FreeLibrary
CreateMutexA
GetTickCount
GetSystemDirectoryA
GetCurrentThreadId
lstrcatA
GetVersionExA
WaitForSingleObject
DeleteFileA
HeapAlloc
HeapFree
GetProcessHeap
Sleep
ReadProcessMemory
ReadFile
VirtualProtectEx
GetTempFileNameA
WriteProcessMemory
GetTempPathA
GetVersion
CloseHandle
GetModuleFileNameA
FindAtomA
lstrlenA
CreateFileA
GetLocalTime
GetLastError
FindWindowExA
GetCursorPos
GetCaretPos
ClientToScreen
EqualRect
IsWindowVisible
GetFocus
wsprintfA
InflateRect
GetThreadDesktop
FindWindowA
GetWindowThreadProcessId
CloseDesktop
OpenInputDesktop
GetWindowRect
SetThreadDesktop
RegCloseKey
CreateProcessAsUserA
RegQueryValueExA
OpenProcessToken
RegEnumValueA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
SHSetValueA
SHGetValueA
EvtShutdown
EvtStartup
inst
run
tes
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ