?CreateDva@@YGHXZ
?GetImagesFrom@@YGHPAXH@Z
?GetModuleMemopry@@YGHXZ
?LoadFileFrom@@YGHXZ
?LoadIcons@@YGHPAXH@Z
_IWMPEvents@0
Static task
static1
Behavioral task
behavioral1
Sample
fd4b409ded788eed00f884057a3665ca6a14d5cd714f87e9c71c40147bc34137.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd4b409ded788eed00f884057a3665ca6a14d5cd714f87e9c71c40147bc34137.dll
Resource
win10v2004-20220901-en
Target
fd4b409ded788eed00f884057a3665ca6a14d5cd714f87e9c71c40147bc34137
Size
22KB
MD5
394231a8e11b9d0f35b6993bc4bb5fb5
SHA1
95d689eba2246d2c21a881f918576d0b201105d0
SHA256
fd4b409ded788eed00f884057a3665ca6a14d5cd714f87e9c71c40147bc34137
SHA512
95a987b8e49c0982a31dd9aa672d0b4e0836118966169f76503839ea104c70641c5579d8692429f2f50a3b344a531e1a18b2faeeb3d95ab31d8f8ac14d2f4987
SSDEEP
384:cBn3NFaJpSci3zJGSO3kT2oJXOOO/s1QDxSLEzxY4FI9BTD8WQQWSYLz:Un7ii3zJGSL2iXRb8QLEz9FOTDGAYLz
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
MultiByteToWideChar
GetFileAttributesA
GetCurrentProcessId
CreateFileA
ExpandEnvironmentStringsA
CreateThread
LoadLibraryA
GetModuleHandleA
GetShortPathNameA
VirtualAllocEx
Sleep
GetSystemTime
CloseHandle
ReadFile
GetFileSize
WriteFile
SetFilePointer
GetTempFileNameA
GetTickCount
GetTempPathA
ReadProcessMemory
VirtualFreeEx
GetModuleFileNameA
WriteProcessMemory
CallNextHookEx
DispatchMessageA
MessageBoxA
TranslateMessage
GetMessageA
SetWindowsHookExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
CoInitialize
CoCreateInstance
free
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
fopen
fwrite
fclose
memset
strcpy
wcscmp
strcmp
strstr
malloc
memmove
realloc
strlen
??2@YAPAXI@Z
??3@YAXPAX@Z
?CreateDva@@YGHXZ
?GetImagesFrom@@YGHPAXH@Z
?GetModuleMemopry@@YGHXZ
?LoadFileFrom@@YGHXZ
?LoadIcons@@YGHPAXH@Z
_IWMPEvents@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ