a23769a50f69b
e12206efd83d7
ff417d7f0583f
Static task
static1
Behavioral task
behavioral1
Sample
0b6a77645402eb031bf07c5584ee9f6e9bf9c84a6a33b81042206eef1ded1781.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0b6a77645402eb031bf07c5584ee9f6e9bf9c84a6a33b81042206eef1ded1781.dll
Resource
win10v2004-20221111-en
Target
0b6a77645402eb031bf07c5584ee9f6e9bf9c84a6a33b81042206eef1ded1781
Size
3.0MB
MD5
8175db528575e89c066a9c65660e1adc
SHA1
519ba273d08ca5f5055a3f1348fb7c7043e8372b
SHA256
0b6a77645402eb031bf07c5584ee9f6e9bf9c84a6a33b81042206eef1ded1781
SHA512
ba7eefaa39601cc937d8d5ff367fde8e5752c8ed2a9e2d2c2100d126fb7dc30e82703e8359dc8b5cd713e9e0b8e79fb4328d69da007fcaf513d499f9fa7c6d1f
SSDEEP
98304:ZKcRL1okyIr+9feJS2yqwq7NfjIQRkhvA:LLZrvHhj/khv
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
OpenProcess
WaitForSingleObject
Sleep
lstrcpyW
CreateProcessW
ProcessIdToSessionId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetSystemInfo
GetTickCount
GetVersionExW
GetFileSize
WriteFile
ReadFile
FindClose
FileTimeToSystemTime
GetTempPathW
CreateFileW
SetFileAttributesW
GetFileAttributesExW
FindNextFileW
MoveFileExW
GetLongPathNameW
AreFileApisANSI
CreateDirectoryW
RemoveDirectoryW
ReleaseMutex
GetSystemDirectoryW
GetVolumeInformationW
ExpandEnvironmentStringsW
WTSGetActiveConsoleSessionId
GetStdHandle
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceW
VirtualAlloc
VirtualFree
LocalFree
SetLastError
GetNativeSystemInfo
LoadLibraryA
IsBadReadPtr
DeviceIoControl
OutputDebugStringA
SetPriorityClass
EncodePointer
InterlockedFlushSList
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
SystemTimeToTzSpecificLocalTime
GetFullPathNameW
GetACP
GetFileType
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetTimeZoneInformation
FlushFileBuffers
GetDriveTypeW
SetStdHandle
WriteConsoleW
GetCurrentDirectoryW
SetEndOfFile
OutputDebugStringW
CreateThread
LocalAlloc
GlobalFree
GlobalAlloc
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
DecodePointer
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CloseHandle
GetModuleFileNameW
FindFirstFileW
GetEnvironmentVariableW
GetProcAddress
LoadLibraryW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
CopyFileW
DeleteFileW
GetCurrentProcess
DeleteCriticalSection
SetConsoleMode
ReadConsoleInputA
VirtualProtect
InitializeCriticalSection
FreeLibraryAndExitThread
ExitThread
SystemTimeToFileTime
GetSystemTime
GlobalMemoryStatus
FlushConsoleInputBuffer
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
VerSetConditionMask
SleepEx
GetFileAttributesExA
FormatMessageA
QueryPerformanceFrequency
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxA
LoadStringW
wsprintfW
ShellExecuteW
ShellExecuteExW
SHGetSpecialFolderPathA
SHGetSpecialFolderPathW
SHGetFolderPathW
CoUninitialize
CLSIDFromString
CoCreateInstance
CoInitialize
EnumProcesses
GetModuleFileNameExW
EnumProcessModules
GetProcessImageFileNameW
PathAddBackslashW
PathFileExistsW
WTSQueryUserToken
CryptGetUserKey
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
RegSetValueExW
RegOpenKeyW
RegEnumKeyW
RegCreateKeyExW
ImpersonateLoggedOnUser
RevertToSelf
ReportEventA
RegisterEventSourceA
DeregisterEventSource
OpenProcessToken
GetTokenInformation
EqualSid
AllocateAndInitializeSid
CryptEnumProvidersA
CryptSignHashA
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptSetHashParam
CryptGetProvParam
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
LookupPrivilegeValueW
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSidSubAuthorityCount
GetSidSubAuthority
FreeSid
GetAdaptersInfo
URLDownloadToFileW
CreateEnvironmentBlock
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertFreeCertificateContext
ord60
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord143
ord217
ord46
ord211
ord50
ord41
ord22
recvfrom
sendto
ioctlsocket
gethostname
shutdown
htonl
gethostbyname
select
WSAGetLastError
socket
__WSAFDIsSet
getservbyname
WSASetLastError
recv
send
bind
closesocket
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSAIoctl
WSAStartup
WSACleanup
getaddrinfo
freeaddrinfo
accept
listen
a23769a50f69b
e12206efd83d7
ff417d7f0583f
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ