F10
F20
FAA
_crt_debugger_hook
Static task
static1
Behavioral task
behavioral1
Sample
f06f6ecad5d1f7cb4ba6ba39c5fdcc28579cd8904612631673add46862ce0d02.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f06f6ecad5d1f7cb4ba6ba39c5fdcc28579cd8904612631673add46862ce0d02.dll
Resource
win10v2004-20221111-en
Target
f06f6ecad5d1f7cb4ba6ba39c5fdcc28579cd8904612631673add46862ce0d02
Size
84KB
MD5
08fe8a9b65bb45237106abb3322ccf5b
SHA1
d6b2a51ec99a54915122fe7dbcfe8b95f2ddb786
SHA256
f06f6ecad5d1f7cb4ba6ba39c5fdcc28579cd8904612631673add46862ce0d02
SHA512
6f46d96a456ae6c7242f891e80c82c755e3a77c64152ee5685b1858497d3210ebe395de7841ca101cf3e75098437eb05fc30723495291760108da198d526ca36
SSDEEP
1536:s3rVXSyfBHRpiHCrBIeCIAc11Ed/RabWp4Ibj/S9ncbB2CsjTn:s3pjfBhBIelAKY/MbWSIbjScbB1s3n
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FreeLibraryAndExitThread
CreateEventW
DeviceIoControl
FreeResource
HeapAlloc
HeapFree
GetProcessHeap
EnumResourceNamesA
OutputDebugStringA
GetVersion
GetSystemDefaultLangID
GetComputerNameA
SetCurrentDirectoryA
GetProcAddress
LocalAlloc
SetEnvironmentVariableA
GetModuleHandleA
SetErrorMode
OpenProcess
TerminateThread
CreateSemaphoreA
TerminateProcess
ReleaseSemaphore
OpenEventA
GetModuleFileNameA
GetCurrentProcessId
CreateFileW
TryEnterCriticalSection
GlobalFree
LoadLibraryA
HeapReAlloc
WideCharToMultiByte
CreateNamedPipeW
FormatMessageA
GetShortPathNameA
SetLastError
CreateMutexA
GetVersionExA
GetTempPathA
CreateDirectoryA
DisableThreadLibraryCalls
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCommandLineA
OpenEventW
WaitNamedPipeW
SetFilePointer
GetFileSize
CreateFileA
CreatePipe
LockResource
CopyFileA
GetLastError
CreateProcessA
SizeofResource
ExpandEnvironmentStringsA
LoadResource
FindResourceA
CreateThread
CloseHandle
DeleteCriticalSection
OpenThread
ConnectNamedPipe
CreateProcessW
PeekNamedPipe
ExitProcess
GetCurrentThreadId
DeleteFileA
LocalFree
FindNextFileA
MoveFileA
FindClose
RemoveDirectoryA
FindFirstFileA
ReadFile
GetFileAttributesA
WriteFile
EnterCriticalSection
LeaveCriticalSection
CreateEventA
Sleep
InitializeCriticalSection
SetEvent
WaitForSingleObject
GetCurrentProcess
GetSystemTime
DuplicateHandle
FreeLibrary
SendInput
GetThreadDesktop
CloseWindowStation
GetParent
OpenInputDesktop
WindowFromPoint
SetProcessWindowStation
GetUserObjectInformationA
CloseDesktop
OpenWindowStationA
SetCursorPos
GetDesktopWindow
SetThreadDesktop
CloseWindow
LoadKeyboardLayoutA
SystemParametersInfoA
SwitchDesktop
CreateWindowStationW
CreateDesktopW
ReleaseDC
GetDC
GetProcessWindowStation
GetWindowDC
GetWindowRect
DeleteDC
StretchBlt
GetDIBits
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
RealizePalette
SelectPalette
GetObjectA
GetStockObject
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RevertToSelf
CloseServiceHandle
DeleteService
SetEntriesInAclA
GetKernelObjectSecurity
CreateServiceA
StartServiceA
DuplicateTokenEx
QueryServiceStatus
ImpersonateLoggedOnUser
MakeAbsoluteSD
SetKernelObjectSecurity
OpenSCManagerA
BuildExplicitAccessWithNameA
ControlService
GetSecurityDescriptorDacl
OpenServiceA
CoTaskMemFree
CoInitialize
CoCreateInstance
gethostbyname
inet_addr
inet_ntoa
closesocket
gethostname
socket
bind
recv
setsockopt
shutdown
htons
WSAGetLastError
WSAStartup
select
htonl
connect
getsockname
send
GetModuleBaseNameA
InternetQueryOptionA
URLDownloadToCacheFileA
strncpy
realloc
strcat
_snwprintf
strcmp
wcscpy
sprintf
memcmp
atoi
wcslen
strcpy
??_U@YAPAXI@Z
strchr
fopen
??_V@YAXPAX@Z
fread
strrchr
fclose
wcsncmp
_vsnprintf
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
?terminate@@YAXXZ
_except_handler3
free
strncat
??2@YAPAXI@Z
malloc
srand
rand
memset
_snprintf
strlen
strncmp
memcpy
_stricmp
wcscmp
_strnicmp
_wcsnicmp
_CxxThrowException
_ftol
??3@YAXPAX@Z
__CxxFrameHandler
NtRequestWaitReplyPort
NtMapViewOfSection
NtUnmapViewOfSection
NtOpenFile
NtCreateSection
RtlDosPathNameToNtPathName_U
RtlAllocateAndInitializeSid
NtOpenProcess
NtMakeTemporaryObject
NtCreateEvent
NtOpenDirectoryObject
NtOpenEvent
RtlPrefixUnicodeString
NtCreateFile
NtQueryDirectoryObject
NtWaitForSingleObject
NtQueryInformationProcess
NtOpenSymbolicLinkObject
RtlInitUnicodeString
NtQuerySystemInformation
NtTerminateProcess
NtSetEvent
NtClose
RtlUnwind
NtConnectPort
GetAdapterIndex
GetIfEntry
GetErrorInfo
F10
F20
FAA
_crt_debugger_hook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ