_LOADLIBRARY_DUMMY
_RunAs@16
Static task
static1
Behavioral task
behavioral1
Sample
aa8fd72c195ab8050f120001cf7ee63bc45ddd7f1f8efa6771d59ec98cae31ca.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa8fd72c195ab8050f120001cf7ee63bc45ddd7f1f8efa6771d59ec98cae31ca.dll
Resource
win10v2004-20220901-en
Target
aa8fd72c195ab8050f120001cf7ee63bc45ddd7f1f8efa6771d59ec98cae31ca
Size
110KB
MD5
65fda25924de689878bdece19cd114d6
SHA1
4e9bdfdc7b61e9817e439eaf6e1b6eb34937a0c9
SHA256
aa8fd72c195ab8050f120001cf7ee63bc45ddd7f1f8efa6771d59ec98cae31ca
SHA512
cd58bcc0e245a2ac5ad7e65e4b187ad451c8f2608af3048c6504baab5f6b26e3ee0633569c0a0f60db6b9ca6913c9e850294c704dae6b83a13f5e447dfd823ca
SSDEEP
1536:PBXkdZY9TiTvO+x0ZcYf80iKVnhl+MMbuFfDOrBWqf:dkPck5KV1FL+Bx
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PulseEvent
InterlockedDecrement
WaitForMultipleObjects
ResetEvent
InterlockedIncrement
FreeLibraryAndExitThread
TerminateProcess
InterlockedCompareExchange
ReleaseMutex
SetEvent
OpenEventA
OpenMutexA
GetModuleFileNameA
GetWindowsDirectoryA
GetLastError
DisableThreadLibraryCalls
ReadDirectoryChangesW
GetFileAttributesExA
WideCharToMultiByte
GetDriveTypeA
GetLogicalDriveStringsA
VirtualFree
VirtualProtect
VirtualAlloc
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateFileA
Thread32First
Module32Next
Module32First
VirtualQuery
GetSystemInfo
QueryDosDeviceA
GetModuleHandleA
ResumeThread
SetThreadContext
GetThreadContext
SuspendThread
OpenThread
GetCurrentThreadId
ExitProcess
WriteFile
DeleteFileA
ReadFile
MoveFileA
SetFilePointer
lstrlenW
GetTempFileNameA
GetTempPathA
FindNextFileA
FindFirstFileA
MultiByteToWideChar
CreateProcessA
CreatePipe
CreateFileMappingA
MapViewOfFile
GetFileSize
WaitForSingleObject
ExitThread
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
CreateEventA
CreateThread
Sleep
WinExec
CopyFileA
SetFileAttributesA
FreeLibrary
CreateMutexA
CloseHandle
GetCurrentProcess
LoadLibraryA
GetProcAddress
GetCurrentThread
Thread32Next
GetCurrentProcessId
MessageBoxA
SetTimer
SetDlgItemTextA
GetDlgItemTextA
DialogBoxParamA
GetWindowTextA
PostMessageA
IsWindow
DispatchMessageA
TranslateMessage
ReleaseDC
FillRect
InflateRect
EnumDesktopWindows
GetClassNameA
EnumChildWindows
EnumWindows
OffsetRect
SetWindowPos
GetDlgItem
SendMessageA
EndDialog
KillTimer
GetMessageA
CallNextHookEx
SetWindowsHookExA
GetWindowThreadProcessId
UnhookWindowsHookEx
PrintWindow
GetWindowRect
GetClientRect
IsRectEmpty
GetWindowDC
GetDC
GetDesktopWindow
ExitWindowsEx
GetParent
ShowWindow
GetStockObject
DeleteObject
CreateCompatibleDC
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
DeleteDC
BitBlt
RegDeleteValueA
RegOpenKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegEnumValueA
CoCreateInstance
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
SysStringLen
SysAllocString
SysFreeString
VariantClear
HttpSendRequestExA
HttpEndRequestA
InternetCrackUrlA
InternetOpenA
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetWriteFile
inet_ntoa
closesocket
WSAStartup
WSACleanup
setsockopt
gethostbyname
GetProcessImageFileNameA
PathFileExistsA
_memicmp
_stricmp
??3@YAXPAX@Z
_mbsstr
memcpy
??2@YAPAXI@Z
__CxxFrameHandler
time
_adjust_fdiv
_initterm
_onexit
__dllonexit
printf
atol
strstr
_ltoa
abs
wcsstr
_mbsnbcat
_mbslwr
_ismbcalpha
memmove
malloc
wcscmp
free
_mbscmp
_mbsupr
_snprintf
_except_handler3
_ismbcprint
memcmp
strncpy
_purecall
clock
memset
_mbsrchr
_mbsnbcpy
_mbsicmp
_mbstok
atoi
_mbschr
strlen
sprintf
strcpy
strcat
GdipAlloc
GdipCreateBitmapFromHBITMAP
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipCloneImage
GdipFree
GdipDisposeImage
GdipSaveImageToStream
GdiplusStartup
ord17
GetAdaptersInfo
RpcStringFreeA
UuidCreate
UuidToStringA
SHGetFolderPathA
_LOADLIBRARY_DUMMY
_RunAs@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ