IndividuallyCALs
InstancesForSoftware
InstancesMust
NeedIndirectlyYou
NeedOtherwise
ServersOf
ThroughYourUserOnlyDevice
YourToServer
Static task
static1
Behavioral task
behavioral1
Sample
767a4937aea1249ea07aebfb62d9558287731e47dae4a6d6cbc6d8c286ac5ab2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
767a4937aea1249ea07aebfb62d9558287731e47dae4a6d6cbc6d8c286ac5ab2.dll
Resource
win10v2004-20220901-en
Target
767a4937aea1249ea07aebfb62d9558287731e47dae4a6d6cbc6d8c286ac5ab2
Size
248KB
MD5
2bf17470d8fbe53f19be2e57ab39baa0
SHA1
01c4f5deb04cddfb24fb7a048ef43b7c805046b9
SHA256
767a4937aea1249ea07aebfb62d9558287731e47dae4a6d6cbc6d8c286ac5ab2
SHA512
330035c2e2c0fb13719ade33af23e1fe0c480ddbc97e073eab6d4a91566fd1f05bf84f3c2371727552e96c8f111fc183e7b79673e7f0d5ff1d215985057de735
SSDEEP
6144:t8fkOEpGqQvFKhUM4yyhpokJ7UyocYSuv:TiwhUiyVxd2v
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LocalAlloc
CreateFileW
SetLastError
FindResourceW
LoadResource
LockResource
FreeResource
OutputDebugStringA
FreeLibrary
GetVersion
GetUserDefaultLCID
IsBadReadPtr
RaiseException
GetStringTypeExA
DuplicateHandle
OpenProcess
CreateFileMappingA
MapViewOfFile
MoveFileW
FindNextFileW
GetFileInformationByHandle
GetTempPathW
RemoveDirectoryW
CreateDirectoryW
GetModuleHandleW
GetVolumeInformationW
LoadLibraryW
GetComputerNameExW
FindFirstFileW
VirtualLock
GetCurrentThread
ReadFile
LeaveCriticalSection
EnterCriticalSection
ResetEvent
DeleteCriticalSection
WaitForMultipleObjectsEx
GetProcAddress
CreateFileA
DeviceIoControl
GetOverlappedResult
GetLastError
Sleep
InterlockedCompareExchange
DisableThreadLibraryCalls
IsDebuggerPresent
ExitProcess
CloseHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
SetStdHandle
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualQuery
InterlockedExchange
RtlUnwind
HeapReAlloc
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LoadLibraryA
SetFilePointer
HeapAlloc
VirtualFree
GetStartupInfoA
GetFileType
SetHandleCount
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
UnhandledExceptionFilter
GetStdHandle
WriteFile
GetVersionExA
GetModuleHandleA
GetModuleFileNameA
lstrcpyA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
LocalFree
FindFirstFileA
FindClose
lstrlenA
VirtualProtect
HeapCreate
HeapDestroy
FreeEnvironmentStringsA
GetEnvironmentStringsW
HeapFree
IsBadCodePtr
GetExitCodeThread
QueryPerformanceFrequency
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
TlsSetValue
TlsGetValue
TlsAlloc
GetEnvironmentVariableW
GetLocaleInfoW
GetModuleFileNameW
OutputDebugStringW
WriteConsoleW
GetConsoleCP
GetConsoleMode
TlsFree
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
InitializeCriticalSectionAndSpinCount
SetEndOfFile
GetLocaleInfoA
GetProcessHeap
LoadStringW
GetKeyboardType
SetSecurityDescriptorOwner
MapGenericMask
AccessCheck
GetFileSecurityW
OpenThreadToken
ImpersonateLoggedOnUser
AddAccessAllowedAce
InitializeAcl
GetLengthSid
FreeSid
OpenProcessToken
RegQueryValueExW
RegOpenKeyExA
GetTokenInformation
EqualSid
GetExplicitEntriesFromAclW
GetSecurityDescriptorControl
RegSetValueExA
RegQueryValueExA
RegCreateKeyExW
SetSecurityDescriptorControl
RegEnumKeyA
RegCloseKey
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegDeleteKeyW
RevertToSelf
CoQueryProxyBlanket
CoInitialize
CoUninitialize
CoSetProxyBlanket
SysFreeString
_vsnwprintf
IndividuallyCALs
InstancesForSoftware
InstancesMust
NeedIndirectlyYou
NeedOtherwise
ServersOf
ThroughYourUserOnlyDevice
YourToServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ