ExportFunc
ExportFunc2
ServiceMain
s
Static task
static1
Behavioral task
behavioral1
Sample
8f8f601e7b0df0014386b822ad3d4d00ed4d9365626fd0d993309204ced080f0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f8f601e7b0df0014386b822ad3d4d00ed4d9365626fd0d993309204ced080f0.dll
Resource
win10v2004-20221111-en
Target
8f8f601e7b0df0014386b822ad3d4d00ed4d9365626fd0d993309204ced080f0
Size
256KB
MD5
86472f34d47895d25e3727219b80a9ad
SHA1
468d5310af4cf74258f64f567d6c941800ae6dd7
SHA256
8f8f601e7b0df0014386b822ad3d4d00ed4d9365626fd0d993309204ced080f0
SHA512
53d8c23b73b93d1d22f28c96e932fde19b47e6c2353cd2b91b4c44f3c08d48523365ad418452916dee509f0e739e3f42889c5cda4fd228f0d8429a17b839c96f
SSDEEP
3072:NKkVl8wj9R4o/CV/b1QkeNbZxj4GgJxRw0N/xpHeBtpoVuWqSyI85PLG8Ol9Jteg:skVllj9mo/S/b1zehqDjHd85nkcA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateFileA
GetProcAddress
LoadLibraryA
FreeLibrary
LocalFree
MapViewOfFile
UnmapViewOfFile
ExitProcess
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
MoveFileExA
lstrlenA
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
InterlockedDecrement
SystemTimeToFileTime
FindNextFileA
LeaveCriticalSection
SetUnhandledExceptionFilter
WriteFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFileTime
FindFirstFileA
FindClose
DeleteFileA
CopyFileA
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetCurrentThreadId
GetLastError
GetTickCount
InterlockedExchange
FreeConsole
GetExitCodeThread
TerminateThread
DisableThreadLibraryCalls
SetLastError
GetModuleFileNameA
Sleep
ReleaseMutex
CreateMutexA
WaitForSingleObject
CloseHandle
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
UnhandledExceptionFilter
IsBadCodePtr
InitializeCriticalSection
GetCPInfo
GetOEMCP
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsBadWritePtr
GetTimeZoneInformation
SetFilePointer
ReadFile
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
GetCurrentProcessId
QueryPerformanceCounter
EnterCriticalSection
GetSystemTimeAsFileTime
GetCommandLineA
RtlUnwind
RaiseException
ExitThread
CreateThread
IsBadReadPtr
GetModuleHandleA
TerminateProcess
GetFileAttributesA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
TranslateMessage
DispatchMessageA
GetMessageA
SetWindowTextA
SetTimer
PostMessageA
MessageBoxA
FindWindowA
SetWindowPos
SystemParametersInfoA
EnumChildWindows
GetWindowThreadProcessId
PostThreadMessageA
KillTimer
EnumWindows
GetClassNameA
RegisterServiceCtrlHandlerA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
RegCreateKeyExA
ControlService
QueryServiceStatus
OpenServiceA
DeleteService
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegCreateKeyA
SetServiceStatus
ShellExecuteA
SHGetFolderPathA
CoCreateInstance
CoCreateGuid
CoInitializeEx
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
VariantInit
Netbios
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
GetProfilesDirectoryA
CreateURLMoniker
ExportFunc
ExportFunc2
ServiceMain
s
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ