WLEventLogoff
WLEventLogon
WLEventShutdown
Static task
static1
Behavioral task
behavioral1
Sample
b504b60661b1f775dd8f3ba1aa8c42fdf076016dc852fb841059a4bfa4107a72.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b504b60661b1f775dd8f3ba1aa8c42fdf076016dc852fb841059a4bfa4107a72.dll
Resource
win10v2004-20220812-en
Target
b504b60661b1f775dd8f3ba1aa8c42fdf076016dc852fb841059a4bfa4107a72
Size
59KB
MD5
4f04fff4ebdcd4e8e08951c2fa1746a0
SHA1
b3d82d8b3ac0d58c34e7a384e44dc48cb999ec9d
SHA256
b504b60661b1f775dd8f3ba1aa8c42fdf076016dc852fb841059a4bfa4107a72
SHA512
fe8d4d0974caf54e989c2dc864c4c168fe880534ee6f6f08731d39ac7c8de89c4eca49722f208e7ae795e7ce7717b16e9203990f5db36012699e84018950cb03
SSDEEP
1536:qyAHG4IldLyULZfF+eXHJ/MFPdvfoHKdqVZan:qCdrVMFNaMsM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindNextFileA
DeleteFileA
FindFirstFileA
GetVolumeInformationA
GetDriveTypeA
GetLogicalDrives
GetComputerNameA
LoadLibraryA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
FindClose
GetEnvironmentVariableA
LocalFree
LocalAlloc
GetLastError
Sleep
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetFileTime
ReadFile
GetFullPathNameA
WriteFile
GetTempFileNameA
GetTempPathA
FileTimeToSystemTime
SystemTimeToFileTime
GetDateFormatA
GetTimeFormatA
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
GetSystemTime
CreateSemaphoreA
TerminateProcess
WinExec
ReleaseSemaphore
ResumeThread
SetThreadContext
VirtualFree
GetThreadContext
VirtualAlloc
VirtualAllocEx
CreateProcessA
FreeLibrary
GetProcAddress
GetVersion
MoveFileExA
MoveFileA
CopyFileA
GetSystemDirectoryA
GetTickCount
GetExitCodeProcess
PeekNamedPipe
GetStartupInfoA
CreatePipe
SetFilePointer
lstrcpyA
lstrcpynA
CreateDirectoryA
RemoveDirectoryA
DisableThreadLibraryCalls
InterlockedDecrement
InterlockedIncrement
WaitForSingleObject
SetEvent
CreateEventA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
lstrcmpiA
VirtualProtect
OutputDebugStringA
GetCurrentProcess
WriteProcessMemory
GetFileAttributesA
GetSystemTimeAsFileTime
VirtualQuery
HeapFree
GetProcessHeap
HeapAlloc
lstrlenA
CreateThread
CloseHandle
GetLocalTime
wsprintfA
MessageBoxA
wvsprintfA
RevertToSelf
RegCreateKeyA
RegNotifyChangeKeyValue
RegEnumValueA
RegDeleteValueA
RegSetValueExA
OpenProcessToken
ImpersonateLoggedOnUser
GetTokenInformation
LookupAccountSidA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
CreateStreamOnHGlobal
NtFreeVirtualMemory
_strcmpi
strchr
NtQuerySystemInformation
memmove
NtOpenProcess
NtClose
_strlwr
strstr
RtlUnwind
NtAllocateVirtualMemory
_allmul
accept
htonl
WSAStartup
htons
bind
__WSAFDIsSet
connect
WSAGetLastError
select
shutdown
setsockopt
closesocket
socket
listen
gethostbyaddr
ioctlsocket
getsockname
send
recv
inet_addr
gethostbyname
gethostname
DnsQuery_A
DnsRecordListFree
ord21
ord13
ord135
ord138
ord19
ord11
ord23
ord140
ord129
ord17
ord75
StrCmpNA
StrToIntA
StrChrA
StrStrA
WLEventLogoff
WLEventLogon
WLEventShutdown
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ