Entry
StartShell
Static task
static1
Behavioral task
behavioral1
Sample
94ff454042d4baea707c4f74243d920d4003e06f46fb89144323cc70c1b66000.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94ff454042d4baea707c4f74243d920d4003e06f46fb89144323cc70c1b66000.dll
Resource
win10v2004-20220812-en
Target
94ff454042d4baea707c4f74243d920d4003e06f46fb89144323cc70c1b66000
Size
89KB
MD5
e4146c693e286798c2d4410b444ec270
SHA1
c6b54c74645bc3f05cbfc73151e26579e2fac25d
SHA256
94ff454042d4baea707c4f74243d920d4003e06f46fb89144323cc70c1b66000
SHA512
feb6ca76cebe04f4cd6cf953c5cddcff66019d01c79f4c87ee134caed2687cc723a7647cde86b1f4b2badc095009891f47e96bb5c9156268b01d3af7182ff604
SSDEEP
1536:sQGyLmV9SQqjSPvhbNqCBNGDNFU80/pHLInAKM/CewJhlusGkUU9UpdUnq7:fGy6V9GjeZbno0/x9KewJhlusGkUU9UQ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VirtualFree
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenMutexA
GetCurrentProcessId
GetCurrentThreadId
GetVersionExA
GetACP
WideCharToMultiByte
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
GetEnvironmentVariableA
GetStartupInfoA
CreatePipe
GlobalFree
GlobalReAlloc
GlobalAlloc
GlobalLock
GlobalSize
GetDriveTypeA
FindClose
FindNextFileA
FindFirstFileA
SetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
HeapReAlloc
GlobalMemoryStatus
GetLongPathNameA
GetTempPathA
GetLocalTime
VirtualProtectEx
GetSystemWindowsDirectoryA
GetTickCount
GetCurrentProcess
TerminateProcess
GlobalUnlock
RtlUnwind
GetCommandLineA
ExitProcess
HeapSize
InterlockedExchange
Process32Next
EnterCriticalSection
LeaveCriticalSection
VirtualProtect
LCMapStringA
LCMapStringW
TlsAlloc
CreateMutexA
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
GetLocaleInfoA
GetCPInfo
GetStringTypeA
GetStringTypeW
GetOEMCP
SetFilePointer
SetStdHandle
FlushFileBuffers
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleA
GetModuleFileNameA
GetFileSize
ReadFile
VirtualAlloc
CreateProcessA
WaitForSingleObject
DeleteCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapAlloc
HeapFree
LoadLibraryA
GetProcAddress
LocalFree
ReleaseMutex
GetSystemDirectoryA
CreateThread
MultiByteToWideChar
MoveFileExA
DeleteFileA
FreeLibrary
OpenProcess
CreateRemoteThread
CreateToolhelp32Snapshot
Process32First
GetLastError
FormatMessageA
SetLastError
Sleep
CreateFileA
WriteFile
VirtualQuery
CloseHandle
SetThreadDesktop
GetSystemMetrics
CloseDesktop
OpenDesktopA
GetDC
ReleaseDC
IsRectEmpty
wsprintfA
OpenWindowStationA
SetProcessWindowStation
GetThreadDesktop
GetProcessWindowStation
GetDesktopWindow
CloseWindowStation
GetStockObject
GetObjectA
SelectPalette
RealizePalette
GetDIBits
CreateDCA
CreateCompatibleDC
GetDeviceCaps
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
DeleteObject
RegSetValueExA
RegCloseKey
CreateServiceA
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
LsaNtStatusToWinError
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LookupAccountSidA
GetTokenInformation
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
RegQueryValueExA
GetUserNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegOpenKeyExA
ShellExecuteA
connect
htons
closesocket
socket
WSAStartup
accept
listen
bind
setsockopt
send
select
gethostname
gethostbyname
recv
inet_addr
GetModuleFileNameExA
EnumProcessModules
URLDownloadToFileA
GetUrlCacheEntryInfoA
Entry
StartShell
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ