?Detoured@@YGPAUHINSTANCE__@@XZ
start
Static task
static1
Behavioral task
behavioral1
Sample
6d3efbd1fa6a1c436e0a0b8ef3a544f6bbb0d6e14d82940f76c7d092d6a885e8.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6d3efbd1fa6a1c436e0a0b8ef3a544f6bbb0d6e14d82940f76c7d092d6a885e8.dll
Resource
win10v2004-20221111-en
Target
6d3efbd1fa6a1c436e0a0b8ef3a544f6bbb0d6e14d82940f76c7d092d6a885e8
Size
93KB
MD5
eada598cc45e8f44709423296b66cd44
SHA1
12983d655d40c776e065d0b7afdd58434adbf003
SHA256
6d3efbd1fa6a1c436e0a0b8ef3a544f6bbb0d6e14d82940f76c7d092d6a885e8
SHA512
5dfd8ba33b6a2068f24af17d4ab089ecef2d0ca1aafc6267d96290a9412b6755b2a95b64660e9799ccf735d7b8ec5e1a360bdbd5fe81b03803268f3e8de59515
SSDEEP
1536:E6YlNaTQSTlWIROq6xWl93aK3k5NdkND75SgyIZCnlR8UUwgE:l8gQElW0exOB3KID753yIZCT8UUK
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenProcess
lstrlenA
GetExitCodeThread
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
SetErrorMode
CreateThread
MoveFileExA
GetCommandLineA
GetLocaleInfoA
UnmapViewOfFile
VirtualAlloc
GetFileSize
MapViewOfFile
CreateFileMappingA
CreateFileA
ReadFile
SetFilePointer
GetPrivateProfileStringA
lstrcpyA
GetLocalTime
VirtualFree
lstrcmpA
GetLastError
GetCurrentThread
WriteFile
GetTickCount
CopyFileA
WideCharToMultiByte
GetCurrentProcess
TerminateProcess
CreateMutexA
GetFileAttributesA
GetVersionExA
CreateFileW
CreateProcessW
GetVersionExW
DeleteFileW
GetPrivateProfileStringW
SetCurrentDirectoryW
GetModuleFileNameW
CompareStringW
FlushFileBuffers
GetStringTypeW
lstrlenW
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
GetProcAddress
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
Sleep
GetModuleFileNameA
OpenMutexA
lstrcpynA
CloseHandle
LCMapStringW
WriteConsoleW
SetStdHandle
HeapReAlloc
MultiByteToWideChar
SetEnvironmentVariableA
HeapSize
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
VirtualQuery
SetLastError
VirtualProtect
InterlockedCompareExchange
GetCurrentThreadId
ResumeThread
FlushInstructionCache
GetThreadContext
SetThreadContext
SuspendThread
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
DecodePointer
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
IsProcessorFeaturePresent
GetTimeZoneInformation
HeapCreate
HeapDestroy
GetModuleHandleW
ExitProcess
GetStdHandle
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
EnterCriticalSection
CharLowerA
CreateDesktopA
CloseDesktop
OpenDesktopA
wsprintfW
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
htons
recv
closesocket
WSAStartup
send
connect
socket
ntohs
StrStrIA
PathRemoveFileSpecA
PathRemoveFileSpecW
?Detoured@@YGPAUHINSTANCE__@@XZ
start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ