NeedForServerYou
TheAccessNeed
YourOtherwiseYourBy
Static task
static1
Behavioral task
behavioral1
Sample
93d14e5a15afabdb86a718d86d4a933bdee4acd6ca2d941306deaeab00c9d898.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93d14e5a15afabdb86a718d86d4a933bdee4acd6ca2d941306deaeab00c9d898.dll
Resource
win10v2004-20220812-en
Target
93d14e5a15afabdb86a718d86d4a933bdee4acd6ca2d941306deaeab00c9d898
Size
188KB
MD5
3d846ebcaa9da0954323ca16b9871c80
SHA1
ff514db5aaa8ef6037a8bd1224a3ab88f3ac12f1
SHA256
93d14e5a15afabdb86a718d86d4a933bdee4acd6ca2d941306deaeab00c9d898
SHA512
aec247e24b60471743ebb092c6f80d61c572f344cccb4b24c9277a177318e5a6f32902ad6483c47cc406bf7dec6f316bd2e412aa57c00f1a9bf07d72fb7fc9dd
SSDEEP
3072:vUqBIWUsljgIilIsawqj1xT+2AnDjisLJ3Jh9ypXnT/H:vUqsQgBIwq7TXAnDlpJip
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FlushFileBuffers
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
CompareStringW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
HeapDestroy
IsBadWritePtr
IsBadReadPtr
SetStdHandle
GetCPInfo
IsValidLocale
IsValidCodePage
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
SetConsoleCtrlHandler
GetTimeZoneInformation
CompareStringA
SetThreadPriority
SetPriorityClass
ResumeThread
SetFileAttributesA
GetLogicalDriveStringsA
SetEnvironmentVariableA
WideCharToMultiByte
GetTempPathA
GetFileAttributesA
GetTempFileNameA
SleepEx
GetShortPathNameA
GetWindowsDirectoryA
lstrcatA
CreateFileMappingA
SetEndOfFile
FindNextFileA
GetVersionExA
GetModuleHandleW
GetCommandLineW
GlobalHandle
GlobalUnlock
PeekNamedPipe
GetModuleFileNameA
QueryPerformanceFrequency
GetExitCodeProcess
GetModuleHandleA
CreateProcessA
GetExitCodeThread
Sleep
WriteConsoleOutputA
SetConsoleWindowInfo
GetConsoleCursorInfo
SetConsoleCursorInfo
Beep
GlobalFree
FatalAppExitA
GetConsoleMode
SetFilePointer
GetFileSize
FileTimeToLocalFileTime
CompareFileTime
CloseHandle
GlobalAlloc
SetConsoleScreenBufferSize
ScrollConsoleScreenBufferA
PeekConsoleInputA
ReadFile
SetConsoleCursorPosition
ReadConsoleInputA
FindFirstFileA
FindClose
GetConsoleCP
GetConsoleScreenBufferInfo
GetCurrentThread
CreateThread
SetConsoleActiveScreenBuffer
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
WriteConsoleOutputCharacterA
ResetEvent
SetEvent
WaitForSingleObject
TlsSetValue
GetLocaleInfoA
InterlockedExchange
IsDebuggerPresent
QueryPerformanceCounter
GetModuleFileNameW
GetLastError
DisableThreadLibraryCalls
TlsAlloc
TlsFree
TlsGetValue
GetStdHandle
RaiseException
RtlUnwind
UnhandledExceptionFilter
WriteFile
ExitProcess
FreeLibrary
GetCommandLineA
GetStartupInfoA
GetThreadLocale
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
GetVersion
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
SetCurrentDirectoryA
HeapAlloc
CreateConsoleScreenBuffer
HeapFree
GetSystemMetrics
GetParent
GetWindowRect
wsprintfA
LoadStringA
UpdateWindow
ExitWindowsEx
GetKeyboardType
SetDlgItemTextA
ShowWindow
SetWindowTextA
GetWindowTextA
IsWindowVisible
EnableWindow
SetTimer
MoveWindow
DefWindowProcA
CreateDialogParamA
CreateWindowExA
RegisterClassExA
KillTimer
LoadCursorA
LoadIconA
GetOpenFileNameA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
CoUninitialize
CoInitialize
SysFreeString
SysAllocStringLen
atol
fclose
fputc
strrchr
strpbrk
exit
atoi
strtok
strstr
isleadbyte
puts
free
fgets
NeedForServerYou
TheAccessNeed
YourOtherwiseYourBy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ