?StartAssistance@@YAHPAUHWND__@@K@Z
?StopAssistance@@YAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
85ea36a1a3b424b00fce0169263a69e12fd67b1a226345f2189eb969bb879fe2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
85ea36a1a3b424b00fce0169263a69e12fd67b1a226345f2189eb969bb879fe2.dll
Resource
win10v2004-20220901-en
Target
85ea36a1a3b424b00fce0169263a69e12fd67b1a226345f2189eb969bb879fe2
Size
292KB
MD5
8139d38ee4f9a857dacba24b4ce1ba80
SHA1
f2fa919b8fc966e7e3b91318683022f05ae6c1a5
SHA256
85ea36a1a3b424b00fce0169263a69e12fd67b1a226345f2189eb969bb879fe2
SHA512
58c7ec1572cf0011ac842673939ece9288b3787b42a61604df812c47c0da7e727186c6b91195325cc96cd1b9fac84863430ece0d9ca04ee7f27f3d50403cdbca
SSDEEP
6144:dttEs5snbi1grAVOP0G7TmPN4aozZAwOPRU:dVU5hPQF4au
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
HeapReAlloc
HeapAlloc
HeapSize
TlsFree
SetLastError
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
GetVersion
InterlockedDecrement
InterlockedIncrement
ReadFile
VirtualAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetFilePointer
FlushFileBuffers
LCMapStringA
LCMapStringW
SetStdHandle
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCommandLineA
RaiseException
RtlUnwind
InterlockedExchange
CreateFileA
MultiByteToWideChar
WideCharToMultiByte
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
GetCurrentProcessId
FreeLibrary
LoadLibraryA
GetProcAddress
ExpandEnvironmentStringsA
WaitForMultipleObjects
ResumeThread
GetCurrentProcess
TlsGetValue
GetCurrentThread
TlsSetValue
TlsAlloc
OpenProcess
TerminateProcess
GetModuleHandleA
GetModuleFileNameA
Sleep
GetCurrentThreadId
ExitProcess
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageA
GetSystemTimeAsFileTime
ResetEvent
SetEvent
EnterCriticalSection
LeaveCriticalSection
GetLastError
DeleteCriticalSection
InitializeCriticalSection
CreateEventA
GetComputerNameA
WaitForSingleObject
TerminateThread
CloseHandle
CreateThread
WriteFile
UnregisterClassA
CreateWindowExA
DestroyWindow
GetForegroundWindow
EnumWindows
DefWindowProcA
RegisterClassA
SetWindowLongA
GetWindowLongA
GetDesktopWindow
ReleaseDC
GetDC
GetIconInfo
DrawIconEx
EmptyClipboard
SetClipboardData
GetClipboardOwner
OpenClipboard
GetClipboardData
CloseClipboard
ChangeClipboardChain
SetClipboardViewer
ToAscii
VkKeyScanA
keybd_event
MapVirtualKeyA
GetAsyncKeyState
GetSystemMetrics
mouse_event
KillTimer
IsWindow
IsWindowVisible
IsIconic
GetWindowRect
IsRectEmpty
SetTimer
GetClientRect
ClientToScreen
LoadImageA
SystemParametersInfoA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
GetProcessWindowStation
EnumDesktopsA
EnumDesktopWindows
GetClassNameA
SendMessageA
GetWindowThreadProcessId
FindWindowA
OpenDesktopA
SetThreadDesktop
GetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
CloseDesktop
ExitWindowsEx
PostMessageA
MessageBoxA
DispatchMessageA
TranslateMessage
PostThreadMessageA
GetCursorPos
CreateDIBSection
SetDIBColorTable
SelectObject
CreateCompatibleDC
DeleteDC
CreateDCA
GetClipBox
CreateCompatibleBitmap
GetDIBits
GetObjectA
GetBitmapBits
DeleteObject
GetSystemPaletteEntries
GdiFlush
BitBlt
GetDeviceCaps
CryptGenRandom
RegQueryInfoKeyA
RegEnumValueA
RegQueryValueExA
RegNotifyChangeKeyValue
CryptReleaseContext
CryptAcquireContextA
RegCreateKeyA
OpenProcessToken
ImpersonateLoggedOnUser
RegCloseKey
RevertToSelf
GetUserNameA
RegOpenKeyExA
CoUninitialize
CoInitialize
CoCreateInstance
closesocket
gethostbyname
htons
inet_addr
WSAGetLastError
socket
WSAStartup
inet_ntoa
getsockname
getpeername
ntohs
shutdown
listen
bind
htonl
accept
recv
select
send
WSACloseEvent
WSAEventSelect
WSACreateEvent
WSAIoctl
WSAResetEvent
WSAEnumNetworkEvents
setsockopt
?StartAssistance@@YAHPAUHWND__@@K@Z
?StopAssistance@@YAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ