StartLoadSys
StartThreadTick
Static task
static1
Behavioral task
behavioral1
Sample
715b8ced65f1c456afcfdfd729692d2f2beae47eb9ca632f138b0f9b135bf154.dll
Resource
win7-20220812-en
Target
715b8ced65f1c456afcfdfd729692d2f2beae47eb9ca632f138b0f9b135bf154
Size
320KB
MD5
005dc456e21d7713e0d634c483742470
SHA1
33a737f3c6c3d2d71f4d8bc38fe456547c90b16d
SHA256
715b8ced65f1c456afcfdfd729692d2f2beae47eb9ca632f138b0f9b135bf154
SHA512
a3f2cc12e540d968976b8dfdf85fe88ddabad8fda4a8d04f091a965d28b7767b8422b5e5a88d9792525ae45154d0753be837d5844bbcd992063cef54c911af63
SSDEEP
6144:Uu+4X0kv86M/vkly+Kq7rlYsp2IdNtOwucQHsXPAOubqoiYOh6z/:Ul+0kv80lyzqnlYsp2IVOwTisXPc2oFP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sleep
GetTickCount
GetProcAddress
LoadLibraryA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
SetFileAttributesA
TerminateProcess
GetCurrentProcess
RaiseException
GetCurrentThreadId
ExitProcess
GetModuleHandleA
GetCurrentThread
VirtualFree
VirtualProtect
VirtualAlloc
GetSystemInfo
SetUnhandledExceptionFilter
CreateProcessA
GetLastError
LocalFree
FormatMessageA
GetModuleFileNameA
lstrcpynA
CreateFileA
GetCurrentProcessId
ReleaseMutex
OpenMutexA
TerminateThread
FreeLibrary
OutputDebugStringA
IsBadReadPtr
HeapAlloc
GetProcessHeap
CreateThread
CreateFileMappingA
MultiByteToWideChar
WideCharToMultiByte
GetVersionExA
GetSystemDirectoryW
GetSystemDirectoryA
CreateMutexA
DeviceIoControl
FindClose
FindFirstFileA
FindNextFileA
SleepEx
Process32Next
Process32First
CreateToolhelp32Snapshot
IsBadWritePtr
GetFileAttributesA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetCurrentDirectoryA
GetDriveTypeA
OpenFileMappingA
MapViewOfFile
CloseHandle
UnmapViewOfFile
DeleteCriticalSection
HeapFree
InitializeCriticalSection
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
LCMapStringW
LCMapStringA
RtlUnwind
GetSystemTimeAsFileTime
DeleteFileA
RemoveDirectoryA
HeapReAlloc
GetCommandLineA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
QueryPerformanceCounter
HeapSize
ReadFile
HeapDestroy
HeapCreate
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
WriteFile
GetTimeZoneInformation
InterlockedExchange
VirtualQuery
FlushFileBuffers
GetACP
GetOEMCP
GetCPInfo
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
IsBadCodePtr
SetStdHandle
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FindWindowA
MessageBoxA
GetWindowTextA
GetClassNameA
EnumThreadWindows
AttachThreadInput
GetActiveWindow
GetWindowThreadProcessId
GetWindow
GetDesktopWindow
DuplicateToken
CheckTokenMembership
OpenProcessToken
SymFromAddr
SymGetLineFromAddr
SymInitialize
SymCleanup
StackWalk
SymGetModuleBase
SymFunctionTableAccess
SymSetOptions
StartLoadSys
StartThreadTick
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE