CreateP2SPTask
GetServerInfo
Install
IsProcessRunning
QueryTaskPeer
RunDllEntry
RunInstall
RunUninsta3l
SetImageFileKey
SetImageFileVersion
UnloadAll
UpdateRegText
Static task
static1
Behavioral task
behavioral1
Sample
1969aeec838b7c423dff5217f90834226385deca1a5b72223a70c537adf5b2f0.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1969aeec838b7c423dff5217f90834226385deca1a5b72223a70c537adf5b2f0.dll
Resource
win10v2004-20220901-en
Target
1969aeec838b7c423dff5217f90834226385deca1a5b72223a70c537adf5b2f0
Size
34KB
MD5
74ca2823c802b528b670fe0868289640
SHA1
55d95702394b7fbd63a64c39aaca52380d3f5501
SHA256
1969aeec838b7c423dff5217f90834226385deca1a5b72223a70c537adf5b2f0
SHA512
f0d5d78c8e6dada279f8359c40cb798b5c5572aa107f63f0fa9d97311041a3e77a022a94a0e4ea4c146ee6af0dc76137586e0202f39189670b455af38954095e
SSDEEP
768:6aVhptxYM0R+MPTj0y3CCmcJ/5c49bOJRtfLy0fb:VpzYMsXH13CCNJ/5c49bOJRR20fb
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcatA
CloseHandle
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryA
GetStartupInfoA
Sleep
GetModuleHandleA
WriteFile
SetFilePointer
CreateFileA
HeapAlloc
GetLastError
SetLastError
lstrlenA
WaitForSingleObject
CreateThread
ExitProcess
MoveFileA
WinExec
GetModuleFileNameA
GetTempPathA
lstrcpyA
FindClose
FindFirstFileA
ReadFile
VirtualAlloc
GetFileSize
GetVersionExA
GetComputerNameA
GetUserDefaultUILanguage
InterlockedExchange
GetTickCount
RaiseException
LocalAlloc
wsprintfA
ExitWindowsEx
GetDesktopWindow
sprintf
_except_handler3
__CxxFrameHandler
_CxxThrowException
atoi
strcspn
strncpy
strstr
wcstombs
??3@YAXPAX@Z
rand
srand
_strlwr
??1type_info@@UAE@XZ
__dllonexit
_onexit
free
_initterm
malloc
_adjust_fdiv
_strrev
CreateP2SPTask
GetServerInfo
Install
IsProcessRunning
QueryTaskPeer
RunDllEntry
RunInstall
RunUninsta3l
SetImageFileKey
SetImageFileVersion
UnloadAll
UpdateRegText
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ