DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
1954f749e77f34d506db410a5409e4719cf264bced4b24ab315fb61bdaa9a0d8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1954f749e77f34d506db410a5409e4719cf264bced4b24ab315fb61bdaa9a0d8.exe
Resource
win10v2004-20220901-en
Target
1954f749e77f34d506db410a5409e4719cf264bced4b24ab315fb61bdaa9a0d8
Size
1.1MB
MD5
3b18075c5ed8b152caf9c0c5ca8fe1a0
SHA1
5ac2cf5e887a5227dad69a6e527fa40f77419833
SHA256
1954f749e77f34d506db410a5409e4719cf264bced4b24ab315fb61bdaa9a0d8
SHA512
e8f5a2324b2b97ffa1f3fc4000446ae9e781ba1e5118878f960d5f3bacb4b9c021a7741c693a6b73f7bcc68062fb1cbfa4a7b523ce2ad2a71521b0c64cc1380c
SSDEEP
24576:7jaCgkwaHC0okYNfRuScDadtLUzNFeeTka27DnnoXy9:vtY0RYMkawn8y9
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
?CreateObjectAgrgtByIID@Com@Util@@YGJABU_GUID@@PAPAXPAUIUnknown@@@Z
?CreateObjectByIID@Com@Util@@YGJABU_GUID@@PAPAX@Z
?LoadStringW@String@Help@@YAPB_WPB_W@Z
?EraseTimerCallback@Timer@Common@Util@@YAJPAUITimerCallback@@I@Z
?GetHexCode@String@Help@@YA_WHH@Z
?CreateObjectByInterface@Com@Util@@YGJPA_WPAPAX@Z
?RegObject@Com@Util@@YGJABU_GUID@@0PA_W1@Z
?RegService@Com@Util@@YGJABU_GUID@@0PA_W1@Z
?SetATLModule@Com@Util@@YGJPAX@Z
?SetOneTimer@Timer@Common@Util@@YAJIPAUITimerCallback@@I@Z
GetLogController
?SetMulTimer@Timer@Common@Util@@YAJIPAUITimerCallback@@I@Z
?InsertStringTable@String@Help@@YAJPAY01QB_WI@Z
?UnInitWinService@Com@Util@@YGJXZ
?GetService@Com@Util@@YGJABU_GUID@@PAPAX@Z
?ClearService@Com@Util@@YGJXZ
InternetSetCookieExW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
AlphaBlend
GetModuleFileNameExW
EnumProcesses
EnumProcessModules
PathFileExistsW
StrCmpW
PathRemoveFileSpecW
SHGetValueW
InitCommonControlsEx
RaiseException
LocalFree
GetModuleFileNameW
GetFileAttributesW
GetModuleHandleW
GetProcAddress
GetLastError
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
SetLastError
CreateProcessW
CloseHandle
GetCurrentProcessId
GetCurrentProcess
OpenProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
GetPrivateProfileStringW
ExitProcess
CreateMutexW
ReleaseMutex
HeapAlloc
GetProcessHeap
HeapFree
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCommandLineW
SetUnhandledExceptionFilter
GetLocalTime
CreateToolhelp32Snapshot
Thread32First
OpenThread
SuspendThread
ResumeThread
Thread32Next
VirtualQuery
IsBadWritePtr
LoadLibraryW
GetModuleHandleA
CreateFileW
ReadFile
GlobalFindAtomW
TerminateProcess
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
lstrcmpiW
FlushInstructionCache
GetVersionExW
WideCharToMultiByte
GetTickCount
SetProcessWorkingSetSize
lstrlenA
WriteFile
GetFileSize
CreateDirectoryW
FindClose
FindFirstFileW
ProcessIdToSessionId
FreeLibrary
QueryInformationJobObject
IsProcessInJob
SetEvent
GlobalAddAtomW
CreateEventW
LoadLibraryExW
SetThreadLocale
GetThreadLocale
GetCurrentThread
ExpandEnvironmentStringsW
InterlockedExchangeAdd
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
SetThreadContext
GetThreadContext
LoadLibraryA
GetStringTypeW
CreateThread
HeapSetInformation
GetStartupInfoW
RtlUnwind
GetSystemTimeAsFileTime
LCMapStringW
GetCPInfo
HeapCreate
GetStdHandle
GetLocaleInfoW
TlsAlloc
TlsGetValue
UnhandledExceptionFilter
TlsSetValue
TlsFree
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetConsoleCP
IsDebuggerPresent
InterlockedExchange
Sleep
EncodePointer
DecodePointer
HeapDestroy
HeapReAlloc
HeapSize
IsProcessorFeaturePresent
GetConsoleMode
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
SetStdHandle
FlushFileBuffers
WriteConsoleW
SetEndOfFile
lstrlenW
ExitThread
IsIconic
EnumThreadWindows
GetActiveWindow
GetParent
MonitorFromRect
UnregisterClassA
SetWindowPos
GetSystemMetrics
GetClassNameW
GetWindow
SystemParametersInfoW
EqualRect
SetWindowLongW
SetWindowTextW
GetWindowLongW
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetWindowPlacement
IsWindow
IsWindowVisible
CopyRect
PostMessageW
LoadImageW
CharLowerBuffW
BringWindowToTop
AttachThreadInput
GetWindowThreadProcessId
FindWindowW
SetForegroundWindow
ScreenToClient
GetAncestor
EnableWindow
IsZoomed
OffsetRect
MonitorFromPoint
RegisterClassExW
IsRectEmpty
CharNextW
CloseWindowStation
DestroyWindow
CreateWindowExW
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
CloseDesktop
OpenInputDesktop
FindWindowExW
AllowSetForegroundWindow
wsprintfW
IsWindowEnabled
ShowWindow
MapWindowPoints
SendMessageW
GetClientRect
SendMessageTimeoutW
UnregisterClassW
DefWindowProcW
MessageBoxW
GetCursorPos
GetForegroundWindow
PtInRect
SetWindowPlacement
SelectObject
CreateCompatibleDC
CreateDIBSection
DeleteObject
DeleteDC
SetSecurityDescriptorDacl
RegQueryInfoKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegDeleteKeyW
RegCreateKeyExW
SetSecurityDescriptorSacl
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
InitializeSecurityDescriptor
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SHGetFileInfoW
SHGetMalloc
SHGetFolderPathW
SHGetSpecialFolderPathW
CommandLineToArgvW
CoInitialize
OleInitialize
OleUninitialize
CoUninitialize
CoTaskMemFree
StringFromCLSID
CoSetProxyBlanket
CoTaskMemAlloc
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
VariantClear
SysFreeString
SysAllocStringLen
RegisterTypeLi
UnRegisterTypeLi
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
SysAllocString
VariantInit
VarBstrCmp
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
SysStringLen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE