DllInit
DllInstall
Static task
static1
Behavioral task
behavioral1
Sample
a3c50fbd7f6dc4384264f0e64ff6c0c7916482a8de9d16de551d993886acb58e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3c50fbd7f6dc4384264f0e64ff6c0c7916482a8de9d16de551d993886acb58e.dll
Resource
win10v2004-20220901-en
Target
a3c50fbd7f6dc4384264f0e64ff6c0c7916482a8de9d16de551d993886acb58e
Size
72KB
MD5
5a7312819ba26b1a56ea1d4d1b651bc0
SHA1
f16f0f37dd2b0549cb7dc8df1468236de481dbfd
SHA256
a3c50fbd7f6dc4384264f0e64ff6c0c7916482a8de9d16de551d993886acb58e
SHA512
a9f0a5f17f1decf91a1423d119d111a51905fbcf1e05494307cf6b717e01b905192e11ef37086c9f55c0b5bc206ca40bb7bcd4e28fa3d0d074df3767bb88da87
SSDEEP
1536:E6z63Gxf3Efz0TKIGFlHMzDticcdAQKvsUyoKHz:EP3kf3EfbFlsvtiZkvXKT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
MoveFileExA
lstrlenA
LoadLibraryA
GetSystemTimeAsFileTime
GetModuleFileNameA
LeaveCriticalSection
GetLastError
lstrcpyW
CreateDirectoryA
CreateThread
lstrlenW
GetModuleHandleA
CreateMutexA
GetProcAddress
HeapFree
InterlockedExchange
CloseHandle
lstrcatW
HeapAlloc
MapViewOfFile
VirtualProtect
VirtualQuery
CreateFileMappingA
CopyFileA
GetStartupInfoW
GetProfileStringA
AssignProcessToJobObject
SetTimeZoneInformation
PostQueuedCompletionStatus
GlobalDeleteAtom
SetFilePointerEx
GetEnvironmentVariableA
GetCurrentThreadId
ResetEvent
GetSystemWindowsDirectoryA
SetWaitableTimer
VirtualUnlock
FileTimeToLocalFileTime
GetVolumePathNameW
GetEnvironmentVariableW
GetTempFileNameW
WriteProcessMemory
GetBinaryTypeW
LocalFree
FindResourceW
GetFileType
GetUserDefaultLangID
DeleteTimerQueueEx
FindFirstFileA
GetDriveTypeW
GetSystemDefaultUILanguage
GlobalAddAtomW
ReadConsoleW
GetTimeZoneInformation
GetDiskFreeSpaceW
GetDateFormatA
CreateToolhelp32Snapshot
lstrcpynW
ReadProcessMemory
SetEnvironmentVariableW
GetProfileSectionA
CopyFileW
SetDefaultCommConfigW
GetConsoleCP
CreateSemaphoreA
LocalFlags
GetVersionExW
OpenProcess
FindResourceA
GetConsoleMode
HeapLock
MoveFileA
GetCurrentProcessId
SetVolumeMountPointW
LocalFileTimeToFileTime
IsBadStringPtrA
GetEnvironmentStrings
GetStringTypeA
DeviceIoControl
GetHandleInformation
CreateFileMappingW
GetTickCount
IsBadHugeWritePtr
VerSetConditionMask
SetComputerNameA
ExitProcess
GetFileAttributesExA
GlobalFlags
FindAtomA
GetDefaultCommConfigW
CreateConsoleScreenBuffer
CallNamedPipeA
FreeEnvironmentStringsW
GetVolumePathNamesForVolumeNameW
GetVolumeInformationW
SetHandleCount
MapViewOfFileEx
GlobalReAlloc
GetThreadTimes
FillConsoleOutputCharacterW
GetLocaleInfoA
HeapDestroy
VirtualQueryEx
GetExitCodeProcess
TransactNamedPipe
GetVolumeNameForVolumeMountPointW
TerminateProcess
LockFile
FindFirstChangeNotificationW
FindCloseChangeNotification
FormatMessageA
LocalHandle
ConnectNamedPipe
lstrcmpiW
GlobalMemoryStatusEx
GetFileAttributesA
ReplaceFileW
MoveFileExW
GetProfileIntW
FreeLibraryAndExitThread
FileTimeToSystemTime
HeapUnlock
SetEvent
SetEndOfFile
CancelWaitableTimer
TerminateThread
GetUserDefaultUILanguage
GetFileSizeEx
GetSystemTime
ResumeThread
FindNextChangeNotification
MultiByteToWideChar
lstrcatA
GetFileInformationByHandle
PulseEvent
GetCPInfo
RegisterWaitForSingleObjectEx
FlushViewOfFile
DosDateTimeToFileTime
OpenFile
GetFullPathNameW
FindClose
CreateNamedPipeW
FormatMessageW
OpenJobObjectW
LocalLock
GlobalAddAtomA
WaitForSingleObjectEx
DllInit
DllInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ