InstallService
RundllInstall
RundllUninstall
ServiceMain
UninstallService
Static task
static1
Behavioral task
behavioral1
Sample
c6684e3dc74dfed0da2b3c1f9c4e917bc36c437a8b7b5e001138042ed17952e7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6684e3dc74dfed0da2b3c1f9c4e917bc36c437a8b7b5e001138042ed17952e7.dll
Resource
win10v2004-20220812-en
Target
c6684e3dc74dfed0da2b3c1f9c4e917bc36c437a8b7b5e001138042ed17952e7
Size
204KB
MD5
f6a0c240a29045cda412941dd015e2d1
SHA1
f18b4b16e102a0ae320e84cbcd172b466fbe09c9
SHA256
c6684e3dc74dfed0da2b3c1f9c4e917bc36c437a8b7b5e001138042ed17952e7
SHA512
e73e7c6fa326081e6a35a230844a34ee7ba59037e7af721e16aac996ad9838d4aabe49a1583a764be93aa457b52d618501e8c16c54b91fc97ccacd62127a4618
SSDEEP
3072:Yx9VahCSpvntkVKsIWS+LKs9xmYjWgJJHItcpEPg+34j:Mbahlhn4K3WS+F//WgvHhpEPq
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StartServiceA
SetSecurityDescriptorDacl
OpenProcessToken
RegOpenKeyA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
OpenServiceA
DeleteService
CloseServiceHandle
QueryServiceStatus
ControlService
CreateServiceA
RegCreateKeyA
RegEnumKeyA
RegCreateKeyExA
RegDeleteKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
CharLowerBuffW
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
SHGetFolderPathA
InterlockedCompareExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
ReadFile
GetExitCodeProcess
CloseHandle
GetVersionExA
CreateToolhelp32Snapshot
Process32First
GetLastError
Process32Next
OpenProcess
GetModuleFileNameA
MultiByteToWideChar
GetSystemDirectoryA
Sleep
CreateThread
TerminateThread
CreateProcessA
SetLastError
TerminateProcess
OpenMutexA
CreateMutexA
WaitForSingleObject
ReleaseMutex
GetCurrentProcess
VirtualQueryEx
ReadProcessMemory
WriteProcessMemory
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcessId
GetTickCount
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleA
ExitProcess
GetCommandLineA
RtlUnwind
RaiseException
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetACP
GetOEMCP
WriteFile
GetStdHandle
LoadLibraryA
HeapSize
GetFileAttributesA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
SetFilePointer
FlushFileBuffers
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
CreateFileA
SetStdHandle
GetLocaleInfoW
InstallService
RundllInstall
RundllUninstall
ServiceMain
UninstallService
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ