ATheAccess
OfYourAccesses
ServerCALsForThe
TheAny
TheIdentifiedDeviceSeparateUsers
YourInstancesNot
Static task
static1
Behavioral task
behavioral1
Sample
8922c88d1ad89d6f4ee36db2fbb80e9571ff7705bf6fba4565fee35f539eb6c3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8922c88d1ad89d6f4ee36db2fbb80e9571ff7705bf6fba4565fee35f539eb6c3.dll
Resource
win10v2004-20220812-en
Target
8922c88d1ad89d6f4ee36db2fbb80e9571ff7705bf6fba4565fee35f539eb6c3
Size
288KB
MD5
65eee97169b036c215de0fe38351db20
SHA1
89d301ab7823a1863444673a5138fb2fae2614e9
SHA256
8922c88d1ad89d6f4ee36db2fbb80e9571ff7705bf6fba4565fee35f539eb6c3
SHA512
8e40b6cedf456bb38b50d4fc6d8129f87e32b4963ffdbfc407eee79ee50f9e845a77838fbe51a8be94bf79ed7ae45c508505fcdfb9760e265109193131463fd1
SSDEEP
6144:WJSnbiSZipCYXdBJ/TbXDG5xvytseGvx16wpl:WUbiSZiHXl/CKSx19
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetLocalTime
SystemTimeToFileTime
SetFileTime
UnlockFile
LockFile
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
DuplicateHandle
WriteConsoleA
SetConsoleMode
ReadConsoleA
HeapSize
HeapWalk
HeapCompact
HeapValidate
CreateProcessW
CreateProcessA
GetExitCodeProcess
MoveFileA
GetDriveTypeW
CreateDirectoryW
SetFileAttributesW
SetCurrentDirectoryW
GetCurrentDirectoryW
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
GetDriveTypeA
GetFullPathNameA
SetFileAttributesA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetLogicalDrives
FileTimeToLocalFileTime
FileTimeToSystemTime
Beep
SetEnvironmentVariableA
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
CompareStringW
CompareStringA
SetStdHandle
FlushFileBuffers
InterlockedDecrement
SetConsoleCtrlHandler
LCMapStringA
GetStringTypeW
GetStringTypeA
UnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetProcAddress
GetOEMCP
GetCPInfo
GetStartupInfoA
GetFileType
SetHandleCount
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
HeapAlloc
HeapFree
FindNextFileW
FindNextFileA
GetCommandLineW
ExitThread
CreateThread
ResumeThread
GetVersion
WriteFile
ExitProcess
GetModuleFileNameW
GetModuleFileNameA
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
RtlUnwind
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
SetEndOfFile
GetFileAttributesExW
GetCurrentThread
GetFileInformationByHandle
FindClose
GetCompressedFileSizeW
LocalFree
GetTempPathW
GetFileAttributesW
RemoveDirectoryW
OutputDebugStringA
GetModuleHandleW
GetVolumeInformationW
CreateFileW
LoadLibraryExW
GetComputerNameExW
FindFirstFileW
GetFullPathNameW
LoadLibraryA
FreeLibrary
SetLastError
ReadFile
CloseHandle
GetLastError
SetErrorMode
GetStdHandle
GetConsoleMode
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
TryEnterCriticalSection
LeaveCriticalSection
TlsAlloc
TlsGetValue
GetExitCodeThread
OpenThread
LoadLibraryW
GetFileAttributesA
WideCharToMultiByte
GetModuleHandleA
GetVersionExA
GetSystemInfo
lstrcmpiA
QueryPerformanceFrequency
MultiByteToWideChar
VirtualQuery
InitializeCriticalSection
Sleep
QueryPerformanceCounter
GetSystemTimeAsFileTime
IsDebuggerPresent
lstrcmpiW
SearchPathW
GetVersionExW
GetSystemDefaultLangID
GetWindowsDirectoryW
GetSystemDirectoryW
lstrlenW
lstrcpyW
lstrlenA
WaitForMultipleObjects
lstrcpynW
ReleaseSemaphore
SetEnvironmentVariableW
GetACP
GetThreadLocale
DisableThreadLibraryCalls
InterlockedExchange
LocalAlloc
GetCommandLineA
TlsSetValue
GetDiskFreeSpaceA
EnumCalendarInfoA
GetFileSize
GlobalGetAtomNameW
GetProcessHeap
IsDBCSLeadByte
FindResourceA
LoadResource
SizeofResource
InterlockedCompareExchange
lstrcmpA
TlsFree
InterlockedIncrement
GetCursorPos
GetScrollInfo
GetSystemMetrics
CharToOemA
SetRect
FillRect
EndPaint
ClientToScreen
CreateDialogParamA
CheckMenuItem
TrackPopupMenuEx
CallWindowProcA
DefWindowProcA
ReleaseDC
GetDC
GetWindowLongA
ScrollWindowEx
DrawTextA
UpdateWindow
ShowWindow
LoadIconA
LoadMenuA
LoadCursorA
TranslateAcceleratorA
LoadAcceleratorsA
EnableMenuItem
GetMenu
SetWindowLongA
InsertMenuItemA
CreatePopupMenu
SetWindowPos
SetScrollInfo
DialogBoxParamA
OemToCharA
GetKeyboardType
LoadStringW
LoadStringA
ScreenToClient
CharNextA
GetSaveFileNameA
GetOpenFileNameA
CommDlgExtendedError
RegCloseKey
OpenThreadToken
DeregisterEventSource
RegQueryValueExW
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetTokenInformation
GetExplicitEntriesFromAclW
ReportEventW
GetUserNameW
GetFileSecurityW
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
FreeSid
SetSecurityDescriptorOwner
AllocateAndInitializeSid
RegQueryValueExA
RegSetValueExA
GetSecurityDescriptorControl
GetNamedSecurityInfoW
SetSecurityDescriptorControl
RegDeleteKeyW
AccessCheck
SHGetMalloc
ShellExecuteW
SHGetFolderPathW
CoTaskMemFree
CoUninitialize
CoInitialize
CoSetProxyBlanket
StringFromCLSID
CoQueryProxyBlanket
CoCreateInstance
SysFreeString
memset
strncmp
isdigit
atoi
atol
toupper
fread
realloc
wctomb
fclose
isxdigit
isleadbyte
calloc
isspace
ftell
malloc
free
strchr
strtok
strrchr
strncpy
memmove
wcsrchr
wcschr
wcstok
wcsncpy
fseek
bsearch
localeconv
wcstombs
InitCommonControlsEx
InternetOpenUrlW
InternetReadFile
HttpQueryInfoW
InternetSetOptionW
InternetGetConnectedStateExW
InternetOpenW
ATheAccess
OfYourAccesses
ServerCALsForThe
TheAny
TheIdentifiedDeviceSeparateUsers
YourInstancesNot
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ