WLEventLogoff
WLEventLogon
WLEventShutdown
Static task
static1
Behavioral task
behavioral1
Sample
01937a9173d58f99a2a2b80abf1c61be01a98ff2398efc69047335b69107f3ef.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01937a9173d58f99a2a2b80abf1c61be01a98ff2398efc69047335b69107f3ef.dll
Resource
win10v2004-20220812-en
Target
01937a9173d58f99a2a2b80abf1c61be01a98ff2398efc69047335b69107f3ef
Size
91KB
MD5
31eeaf7a92b41cf346ef9bc3219e4a70
SHA1
f4d925500eea78098f4db43a86287ad2371bba49
SHA256
01937a9173d58f99a2a2b80abf1c61be01a98ff2398efc69047335b69107f3ef
SHA512
1f318873b7acd9e0b03aa2f74a559f9cae4a670dd40e47a3d6839466b1dd4c63aef60f0191ed3a1d12c1400d4e77d2c1c836befa57c10a35b5e93029cb3ca6e8
SSDEEP
1536:3wJF/Ili4unZiXHPG+uCGZKTG8pK1v5Z/L/KVQwqd9BcKWUiGtS:3wJdp+udB1xJL7hBHWUisS
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
GetLastError
CreateEventA
Sleep
MoveFileA
DeleteFileA
GetTempFileNameA
TerminateThread
GetCurrentThread
CreateMutexA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
SetEvent
InterlockedIncrement
InterlockedDecrement
CreateSemaphoreA
DeviceIoControl
FindNextFileA
FindFirstFileA
GetVolumeInformationA
GetDriveTypeA
GetLogicalDrives
GetComputerNameA
LoadLibraryA
SetUnhandledExceptionFilter
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
FindClose
GetEnvironmentVariableA
LocalFree
LocalAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetFileTime
CreateProcessA
GetTempPathA
FileTimeToSystemTime
SystemTimeToFileTime
GetTimeZoneInformation
GetLocalTime
GetSystemTime
GetModuleFileNameA
GetCurrentThreadId
WinExec
ReleaseSemaphore
ResumeThread
SetThreadContext
VirtualFree
GetThreadContext
VirtualAlloc
VirtualAllocEx
FreeLibrary
GetProcAddress
GetVersion
lstrlenA
MoveFileExA
CopyFileA
GetTickCount
GetExitCodeProcess
SetFilePointer
lstrcpyA
lstrcpynA
CreateDirectoryA
RemoveDirectoryA
DisableThreadLibraryCalls
WaitForSingleObject
PeekNamedPipe
ReadFile
TerminateProcess
OutputDebugStringA
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpiA
VirtualProtect
GetCurrentProcess
WriteProcessMemory
GetFileAttributesA
GetSystemTimeAsFileTime
VirtualQuery
HeapFree
GetProcessHeap
HeapAlloc
CreateFileA
WriteFile
CreateThread
CloseHandle
GetFullPathNameA
wsprintfA
MessageBoxA
wvsprintfA
OpenServiceA
CloseServiceHandle
RegEnumValueA
RegDeleteValueA
RegSetValueExA
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
GetTokenInformation
LookupAccountSidA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
ControlService
DeleteService
OpenSCManagerA
CreateServiceA
StartServiceA
CreateStreamOnHGlobal
RtlUnwind
memmove
strchr
tolower
_allmul
_strcmpi
NtAllocateVirtualMemory
_chkstk
strstr
_strlwr
NtQuerySystemInformation
NtFreeVirtualMemory
NtOpenProcess
NtClose
listen
bind
htons
recv
WSASetLastError
select
WSAGetLastError
connect
gethostbyaddr
__WSAFDIsSet
accept
gethostname
gethostbyname
getsockname
WSAStartup
inet_addr
ioctlsocket
send
shutdown
setsockopt
closesocket
socket
htonl
DnsQuery_A
DnsRecordListFree
ord17
ord129
ord140
ord13
ord23
ord21
ord11
ord19
ord138
ord135
ord75
StrChrA
StrStrA
StrToIntA
StrCmpNA
WLEventLogoff
WLEventLogon
WLEventShutdown
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ