GetName
_GetName@16
Static task
static1
Behavioral task
behavioral1
Sample
836d090a5c77be7e2e7301dffa0a0dc6a3b8c8f6d9d144917ad7894278019a60.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
836d090a5c77be7e2e7301dffa0a0dc6a3b8c8f6d9d144917ad7894278019a60.dll
Resource
win10v2004-20220812-en
Target
836d090a5c77be7e2e7301dffa0a0dc6a3b8c8f6d9d144917ad7894278019a60
Size
64KB
MD5
8391dcf90812acbbee31b8aac14e0da0
SHA1
61d0392a73339f4873e84355201cbe9720bf308f
SHA256
836d090a5c77be7e2e7301dffa0a0dc6a3b8c8f6d9d144917ad7894278019a60
SHA512
99a0ed1ded2e7d7ba87abdc9b97a317bc17f4e9acefaf750abf53650c9451ef3ef137ee8f2ca83a50eb874ce892575b046f10f68478fb5d2b7f54543809dac9f
SSDEEP
768:ZbWB7uLN+JnzyxFSpECGQvN4axPdPcPKeYiz:lWB73zyvSyCGQ1PdGnz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
ReleaseMutex
GetLastError
VirtualFreeEx
VirtualAllocEx
FindClose
FindNextFileA
lstrcmpiA
lstrcatA
CloseHandle
GetCurrentProcess
Module32First
VirtualProtectEx
GetModuleHandleA
ReadFile
CreateMutexA
DeleteFileA
GetModuleFileNameA
CopyFileA
TerminateProcess
GlobalFree
GlobalUnlock
DisableThreadLibraryCalls
IsBadReadPtr
CreateFileA
GetTempPathA
GetCurrentProcessId
WaitForSingleObject
Sleep
LoadLibraryA
GetProcAddress
WinExec
lstrcpyA
lstrlenA
InitializeCriticalSection
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetFileSize
EnumWindows
GetForegroundWindow
GetWindowTextA
GetWindowRect
GetDC
ReleaseDC
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
wsprintfA
GetWindowThreadProcessId
SetThreadDesktop
GetNearestPaletteIndex
DeleteObject
CreateHalftonePalette
GetPaletteEntries
LookupPrivilegeValueA
SetSecurityDescriptorDacl
OpenProcessToken
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
getpeername
gethostbyname
WSAStartup
closesocket
send
recv
select
connect
ioctlsocket
htons
socket
_purecall
_splitpath
strcat
strchr
sscanf
strrchr
rand
srand
free
__dllonexit
_onexit
??2@YAPAXI@Z
strlen
strstr
strncat
fflush
fopen
fwrite
fputc
fclose
_beginthreadex
strcmp
memset
memcpy
_itoa
__CxxFrameHandler
strcpy
atoi
StrStrIA
MakeSureDirectoryPathExists
GetName
_GetName@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ