IfInLoadFPath
IfInLoadFPathv2
InWorld
Work
checksetupok
test_work
Static task
static1
Behavioral task
behavioral1
Sample
3eb9e3f9bcd374133e408b395a6d96dde16c8cf964ffa3d691759326897a6ea5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3eb9e3f9bcd374133e408b395a6d96dde16c8cf964ffa3d691759326897a6ea5.dll
Resource
win10v2004-20220812-en
Target
3eb9e3f9bcd374133e408b395a6d96dde16c8cf964ffa3d691759326897a6ea5
Size
224KB
MD5
6babf0d20949c824e25b29b6df6e4cb0
SHA1
a5dc5970c4aa11fe97db85bd3159616ed4182659
SHA256
3eb9e3f9bcd374133e408b395a6d96dde16c8cf964ffa3d691759326897a6ea5
SHA512
86607a8ba49250664f0d005471078c4727a5de4f976c7cfa34f438c881d9a274e98e72fe3d436f936599e16f8fbd61be66f47a80a351b11b60cf240721c5218e
SSDEEP
3072:NiJ0imeBZfqdKe0y0IVGnqcxikpo8Tch6d+kmJeTl1eDUgtTuYAl5bx2znH:NCJZftetpVGlpo8Tc0d+kmieZAl1Ub
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileSize
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualProtect
VirtualFree
HeapFree
FreeLibrary
GetModuleHandleA
InterlockedExchange
LeaveCriticalSection
EnterCriticalSection
CreateThread
MoveFileExA
CreateDirectoryA
WaitForSingleObject
CreateMutexA
ReleaseMutex
InitializeCriticalSection
GetExitCodeThread
TerminateThread
CreateProcessA
GetProcAddress
LoadLibraryA
FindClose
FindNextFileA
FindFirstFileA
GetTickCount
InterlockedIncrement
MapViewOfFile
CreateFileMappingA
DeviceIoControl
GlobalFree
LoadLibraryExA
GlobalAlloc
GlobalMemoryStatus
MultiByteToWideChar
WideCharToMultiByte
ReadFile
GetSystemDirectoryA
ExpandEnvironmentStringsA
GetEnvironmentVariableA
GetProcessId
VirtualQuery
MoveFileA
LocalFree
GetCommandLineW
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
GetModuleHandleW
GetModuleFileNameW
GetThreadContext
CreateProcessW
SetFileTime
SystemTimeToFileTime
GetSystemTime
GetLocalTime
VirtualQueryEx
GetCurrentDirectoryA
LocalFileTimeToFileTime
GetFileAttributesA
FileTimeToSystemTime
GetFileInformationByHandle
UnmapViewOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
TerminateProcess
GetVersionExA
lstrcmpiA
lstrcpyA
lstrlenA
lstrcatA
GetCurrentProcessId
SetCurrentDirectoryA
CreateFileA
SetFilePointer
WriteFile
GetModuleFileNameA
CopyFileA
Sleep
DeleteFileA
ExitProcess
WTSGetActiveConsoleSessionId
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
CloseHandle
GetCurrentProcess
GetLastError
FlushFileBuffers
RaiseException
SetStdHandle
GetStringTypeW
GetStringTypeA
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
RtlUnwind
HeapReAlloc
GetTimeZoneInformation
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
IsBadWritePtr
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetDesktopWindow
wsprintfA
DeleteService
ControlService
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegCloseKey
DuplicateTokenEx
SetTokenInformation
RevertToSelf
ImpersonateLoggedOnUser
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
QueryServiceStatusEx
SHGetSpecialFolderPathA
CommandLineToArgvW
ShellExecuteA
StrStrIA
WSAStartup
gethostbyname
gethostname
inet_addr
IfInLoadFPath
IfInLoadFPathv2
InWorld
Work
checksetupok
test_work
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ