ServiceMain
aaaaaaaaaaaa
bbbbbbbbbbbb
cccccccccccc
zzzzzzzzzzzzz
Static task
static1
Behavioral task
behavioral1
Sample
7cbdb14d20c12277968051733117683d4f2a13cbcdfefe8bfdd6cc006a6c540d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cbdb14d20c12277968051733117683d4f2a13cbcdfefe8bfdd6cc006a6c540d.dll
Resource
win10v2004-20220812-en
Target
7cbdb14d20c12277968051733117683d4f2a13cbcdfefe8bfdd6cc006a6c540d
Size
97KB
MD5
fc4ac4d1c3f9be96497ba000be2d2cfe
SHA1
29b60b2b703c36ac251d238a856375418ac91002
SHA256
7cbdb14d20c12277968051733117683d4f2a13cbcdfefe8bfdd6cc006a6c540d
SHA512
a9fcad750e134642107583e2f60d7f5ddf07405e972970df7be8d1c0cab806692b6dba2203deb5a13b0a1ddc08956c8f00920699e144407c3b1ca67302ca4e3f
SSDEEP
1536:c/4B/QnWkJk51cURjf8/CVvsJpEBXJ5EkxYdWMZbk7DfaopKaHjwki8:s4B/QWkJk51HRD8/CVsJpELhMZwXHjhJ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
GetTickCount
WaitForMultipleObjects
DeviceIoControl
GlobalMemoryStatus
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
RaiseException
GetLocalTime
MoveFileExA
OpenProcess
GetWindowsDirectoryA
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetDiskFreeSpaceExA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
CreateEventA
LoadLibraryA
GetProcAddress
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
PeekNamedPipe
BlockInput
SendMessageA
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
ExitWindowsEx
GetClipboardData
GetSystemMetrics
UnhookWindowsHookEx
DestroyCursor
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
IsWindow
CloseWindow
CreateWindowExA
DispatchMessageA
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetDC
LoadCursorA
GetActiveWindow
SetRect
GetWindowTextA
OpenClipboard
MessageBoxA
TranslateMessage
GetMessageA
wsprintfA
CharNextA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
RegCloseKey
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegDeleteValueA
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
SHGetSpecialFolderPathA
SHGetFileInfoA
SHDeleteKeyA
_strnset
_strnicmp
calloc
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_strcmpi
_beginthreadex
wcstombs
realloc
strncat
strtok
_errno
strncmp
atoi
strncpy
strrchr
strcat
_except_handler3
free
strcmp
strcpy
malloc
strchr
_CxxThrowException
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInUnprepareHeader
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInAddBuffer
waveOutGetNumDevs
waveOutOpen
waveInClose
WSAIoctl
setsockopt
connect
ntohs
htons
gethostbyname
socket
closesocket
gethostname
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
send
select
recv
WSACleanup
WSAStartup
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
ICSeqCompressFrame
ICSendMessage
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
EnumProcessModules
GetModuleFileNameExA
WTSFreeMemory
WTSQuerySessionInformationA
ServiceMain
aaaaaaaaaaaa
bbbbbbbbbbbb
cccccccccccc
zzzzzzzzzzzzz
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ