DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f1ad1f506f6f5955ddce4f0fe677e6e337d06294a41762e65d9d127d2626da67.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f1ad1f506f6f5955ddce4f0fe677e6e337d06294a41762e65d9d127d2626da67.exe
Resource
win10v2004-20220812-en
Target
f1ad1f506f6f5955ddce4f0fe677e6e337d06294a41762e65d9d127d2626da67
Size
122KB
MD5
80b3ba07374fb6551c2d6f8adf88c280
SHA1
485bc2bf021f6aa84c6f6c6b0a5576f30390102f
SHA256
f1ad1f506f6f5955ddce4f0fe677e6e337d06294a41762e65d9d127d2626da67
SHA512
c74ab2efe1d3ee91bf153d832ca9cace75db3d26714daa04a41b44db933b00ddac144433e4f89011059f4283d3e310b6b779a34fbc7c7ab479ca94e25b9d1fe4
SSDEEP
3072:uP7fzKWcWOvyxbRmy75vTdMuNsv9TdF89MCIFvlsr6:upcWJJAk51NsFf87QvD
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PathRemoveArgsA
PathUnquoteSpacesA
PathFileExistsA
PathQuoteSpacesA
StrRChrA
PathAppendA
SetSecurityDescriptorDacl
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerExA
RegDeleteKeyA
QueryServiceConfigA
CreateServiceA
GetUserNameA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextA
InitializeSecurityDescriptor
QueryServiceStatusEx
CloseServiceHandle
GetTokenInformation
OpenProcessToken
DeleteService
OpenServiceA
OpenSCManagerA
StartServiceA
ControlService
SetServiceStatus
EnumServicesStatusExA
CharNextA
LoadStringA
CharLowerA
wvsprintfA
LCMapStringA
LCMapStringW
GetTempFileNameA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
lstrlenA
CloseHandle
GetModuleHandleA
WideCharToMultiByte
GetStringTypeExA
GetThreadLocale
lstrcmpA
lstrcmpiA
GetProcAddress
ReadFile
GetFileSize
CreateFileA
WriteFile
DeleteFileA
GetVersionExA
GetCurrentProcess
LoadLibraryA
VirtualQuery
Sleep
GetCurrentProcessId
UnmapViewOfFile
ReleaseMutex
WaitForSingleObject
CreateMutexA
MapViewOfFileEx
SetEvent
OpenEventA
GetLastError
MoveFileExA
GetTickCount
GetFileTime
GetVolumeInformationA
CreateFileMappingW
GetExitCodeProcess
lstrlenW
GetComputerNameA
QueryDosDeviceA
GetLogicalDriveStringsA
ExpandEnvironmentStringsA
FreeLibrary
GetModuleFileNameA
GetTempPathA
lstrcpynA
FileTimeToSystemTime
IsBadReadPtr
CreateThread
ExitProcess
CreateEventW
OpenEventW
FreeLibraryAndExitThread
CreateEventA
GetLocaleInfoA
HeapReAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapAlloc
HeapFree
RtlLookupFunctionEntry
RtlUnwindEx
GetModuleHandleW
GetCommandLineA
GetStdHandle
HeapSetInformation
HeapCreate
RaiseException
RtlPcToFileHeader
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSize
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
SHGetSpecialFolderPathA
ShellExecuteExA
CoInitialize
StringFromGUID2
CoUninitialize
GetProcessImageFileNameA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ