Fny
Fzm
Gye
Jaj
Mfk
Mnc
Qwh
Tqp
Vam
Vgv
Xbn
Xqd
Ygl
Static task
static1
Behavioral task
behavioral1
Sample
af7d03e3fb8884b34a0f9a001cab37833352c35a9207590c7edf73fcfc00730d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af7d03e3fb8884b34a0f9a001cab37833352c35a9207590c7edf73fcfc00730d.dll
Resource
win10v2004-20220812-en
Target
af7d03e3fb8884b34a0f9a001cab37833352c35a9207590c7edf73fcfc00730d
Size
298KB
MD5
49dc96df0210a660a67471d406937f02
SHA1
3437c60bf55d9ad6d92db6a990cf475ba05d20db
SHA256
af7d03e3fb8884b34a0f9a001cab37833352c35a9207590c7edf73fcfc00730d
SHA512
c05428b9a56acbadfb9c7de8bef9632b06c67390bcf6499eb8e1e21c0427f8b870eaeea5707715aa9ef12b26372d5305f1a8bebbac5e55b024ebe925d1a88c91
SSDEEP
6144:QcmX3/qdpjlkTKMSXTLRWdlq3IS/8JQ9gh6zKNP:QR3/iZeLSXTQg3IQ81f
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VariantCopyInd
VariantClear
SysFreeString
SysAllocStringLen
LoadTypeLib
ControlService
StartServiceA
OpenProcessToken
SetSecurityDescriptorDacl
QueryServiceStatus
WriteFmtUserTypeStg
GetRunningObjectTable
GetConvertStg
CoDisconnectObject
CreateDataAdviseHolder
CreateBindCtx
CoTaskMemAlloc
CoGetMalloc
CoGetClassObject
SetCursor
MessageBoxIndirectA
DrawIcon
DefDlgProcA
ShowOwnedPopups
SHGetFileInfoA
SHBindToParent
SHFileOperationA
PathFindExtensionA
PathCompactPathExA
PathCanonicalizeA
PathIsDirectoryA
PathQuoteSpacesA
PathUnquoteSpacesA
time
strstr
sprintf
memchr
rand
fflush
malloc
vsprintf
TlsSetValue
lstrcatA
lstrcpyA
RaiseException
LocalAlloc
GetDateFormatA
FreeResource
FlushFileBuffers
EnumResourceLanguagesA
ReadFile
Fny
Fzm
Gye
Jaj
Mfk
Mnc
Qwh
Tqp
Vam
Vgv
Xbn
Xqd
Ygl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ