AssignServerAuthenticatedThe
ByThatTwoOf
CALsToOrOtherwise
ToThose
UpHardwareIndividuallySoftware
Static task
static1
Behavioral task
behavioral1
Sample
e7f608a3eac4ad6f8c4d754b1aeefbbe441a5e1a75e1ac75eeb1abe34a800a68.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e7f608a3eac4ad6f8c4d754b1aeefbbe441a5e1a75e1ac75eeb1abe34a800a68.dll
Resource
win10v2004-20221111-en
Target
e7f608a3eac4ad6f8c4d754b1aeefbbe441a5e1a75e1ac75eeb1abe34a800a68
Size
212KB
MD5
8af3789d11262b5c4cbc671c8d377940
SHA1
0c16594155b60b60cab2ca2ff2941a7a74b67c63
SHA256
e7f608a3eac4ad6f8c4d754b1aeefbbe441a5e1a75e1ac75eeb1abe34a800a68
SHA512
e0c9d2b3d8e0503de79c9928cc0ad7bf59a065eb99f5392091b230d34ec68a1ee581caf7145115285788b9149bdf82a67e27e47f82477ca5bc44b27f3492f109
SSDEEP
3072:PfjL4/z8GWZMf0bmQS3K6jhw88DjkaCT1vjB1HOfV9Sf92FeH:X4AGWZRSQ56SXHkfBrB1wc2Fe
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
TlsGetValue
TlsSetValue
GetStdHandle
RtlUnwind
UnhandledExceptionFilter
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
GetVersion
GetVersionExA
VirtualAlloc
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapFree
GetProcessHeap
HeapAlloc
GetFileSize
Sleep
GlobalFree
GlobalAlloc
WaitForMultipleObjects
CreateEventW
GetTempPathW
FindClose
FindNextFileW
ReadFile
CreateFileW
FindFirstFileW
RemoveDirectoryW
DeleteFileW
ExitProcess
GetCommandLineW
lstrcmpiA
LocalAlloc
OpenProcess
TlsFree
GetSystemDirectoryW
LoadLibraryW
GetModuleFileNameW
RaiseException
LeaveCriticalSection
EnterCriticalSection
VirtualFree
DeleteCriticalSection
GetCurrentThread
InitializeCriticalSection
GetThreadContext
WaitForDebugEvent
SetEvent
DebugActiveProcess
CreateDirectoryA
GetLocalTime
ReadProcessMemory
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
IsBadReadPtr
WriteFile
LocalFree
LoadLibraryA
SuspendThread
WaitForSingleObject
GetModuleFileNameA
GetFileAttributesA
InterlockedCompareExchange
CloseHandle
GetLastError
CreateEventA
GetProcAddress
DisableThreadLibraryCalls
IsDebuggerPresent
FileTimeToLocalFileTime
InterlockedExchange
FileTimeToSystemTime
VirtualQuery
OpenThread
GetExitCodeThread
TlsAlloc
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemInfo
GetSystemTime
FreeLibrary
SetLastError
GetDiskFreeSpaceExW
MoveFileExW
GetFileInformationByHandle
CreateDirectoryW
CreateFileA
GetDriveTypeW
FlushFileBuffers
TryEnterCriticalSection
GetFullPathNameW
GetComputerNameExW
LoadLibraryExW
GetDiskFreeSpaceW
GetVersionExW
GetCompressedFileSizeW
GetShortPathNameW
FindVolumeClose
FindNextVolumeW
WideCharToMultiByte
CreateProcessA
EnumWindows
FlashWindow
SetActiveWindow
OemToCharA
GetKeyboardType
wvsprintfA
FindWindowA
GetWindowThreadProcessId
wsprintfA
LoadIconA
SetForegroundWindow
GetWindowInfo
RegOpenKeyExA
RegSetValueExA
RegOpenKeyExW
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
GetNamedSecurityInfoW
EqualSid
GetSecurityDescriptorControl
GetExplicitEntriesFromAclW
AllocateAndInitializeSid
FreeSid
GetLengthSid
ReportEventW
GetUserNameW
MapGenericMask
OpenThreadToken
ImpersonateSelf
RevertToSelf
GetFileSecurityW
RegEnumKeyA
RegQueryValueExA
GetTokenInformation
IsValidSid
GetSidSubAuthority
DuplicateTokenEx
OpenProcessToken
RegCloseKey
ShellExecuteW
ShellExecuteA
SHGetFolderPathW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteExA
CoUninitialize
CoSetProxyBlanket
CoTaskMemFree
CoInitialize
SysFreeString
SysReAllocStringLen
fprintf
memcmp
strtod
strcat
getc
malloc
clearerr
fwrite
time
sprintf
strcspn
fgets
getenv
mktime
realloc
calloc
exit
vfprintf
tolower
strerror
atoi
strtok
strcpy
strlen
strncmp
strchr
strstr
free
fread
CertCloseStore
CertFindCertificateInStore
CertGetNameStringW
AssignServerAuthenticatedThe
ByThatTwoOf
CALsToOrOtherwise
ToThose
UpHardwareIndividuallySoftware
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ