Maintenance
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
330ca2948bee9ef3a40aa82de4f24d4c9b0d952de5d62f3155d4cbed12c9e12f.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
330ca2948bee9ef3a40aa82de4f24d4c9b0d952de5d62f3155d4cbed12c9e12f.dll
Resource
win10v2004-20220812-en
Target
330ca2948bee9ef3a40aa82de4f24d4c9b0d952de5d62f3155d4cbed12c9e12f
Size
124KB
MD5
0ca443a9a25fda71640a241e5cff59c2
SHA1
307e08985d197a05eb62e27fdfd0fb66eb26ceb0
SHA256
330ca2948bee9ef3a40aa82de4f24d4c9b0d952de5d62f3155d4cbed12c9e12f
SHA512
e6b732c1cef7b11046c3ff97acd7a99a4cc8b0a4c309b661c3636d04e02d21ce85b2db0e389846d72bef03b03f1fa3e2ac3d5869c37ac1852fbbdb03df4168bc
SSDEEP
3072:jEgGxJHEzSdKSyqWz2fP3XDDuSL7taghGa9evYRx:jEgWHEmH333uSvtaghyY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
LookupPrivilegeValueA
InitializeSecurityDescriptor
AdjustTokenPrivileges
StartServiceA
SetServiceStatus
RegisterServiceCtrlHandlerA
OpenServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
wvsprintfA
ShowWindow
SendMessageA
PostMessageA
MessageBoxA
LoadStringA
GetWindowThreadProcessId
GetSystemMetrics
GetDlgItem
FindWindowExA
FindWindowA
CharNextA
CharLowerBuffA
CharUpperBuffA
CharToOemA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
lstrlenW
WriteProcessMemory
WritePrivateProfileStringA
WriteFile
WinExec
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualProtect
VirtualAllocEx
Sleep
SetEvent
SetErrorMode
ResetEvent
ReadFile
OpenProcess
OpenMutexA
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GetWindowsDirectoryA
GetVersionExA
GetVersion
GetThreadLocale
GetTempPathA
GetSystemDirectoryA
GetStdHandle
GetProcAddress
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFileSize
GetFileAttributesA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
GetCPInfo
FreeLibrary
FreeConsole
FormatMessageA
EnumCalendarInfoA
EnterCriticalSection
DuplicateHandle
DeleteFileA
DeleteCriticalSection
CreateThread
CreateRemoteThread
CreateMutexA
CreateFileA
CreateEventA
CreateDirectoryA
CompareStringA
CloseHandle
Sleep
Netbios
WSACleanup
WSAStartup
gethostname
gethostbyname
Maintenance
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ