ResetSSDT
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
67e1cea811db157fdfddac58c91f395dd316478d908edc811bf53198f79b27ea.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67e1cea811db157fdfddac58c91f395dd316478d908edc811bf53198f79b27ea.dll
Resource
win10v2004-20220901-en
Target
67e1cea811db157fdfddac58c91f395dd316478d908edc811bf53198f79b27ea
Size
87KB
MD5
6525d1b251c96fa0ded9a0b508e4354e
SHA1
a3bfcaf53bf092165b98d7227465c89c2c72395e
SHA256
67e1cea811db157fdfddac58c91f395dd316478d908edc811bf53198f79b27ea
SHA512
aeabed2ac2a6dc461ec6b6b2354eaeb4bc67da829d9bb1fa10b9ae6c67665d3d87ad717054b804f5959a2bc11af299a847c6a4147f98a5c983236dbc0b11361a
SSDEEP
1536:tRPTlp6JABRkte9Qp9vcA6MfRSq4JwZm5ksBu:PPr66bu9vL6uRSqYwZm5ksBu
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileAttributesA
GetTempPathA
TerminateThread
MoveFileExA
GetTickCount
GetLocalTime
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
SizeofResource
GetSystemDirectoryA
FindResourceA
DeviceIoControl
LoadLibraryExA
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
lstrcmpiA
WriteFile
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
SetLastError
MoveFileA
GetLastError
LoadResource
SetFilePointer
ReadFile
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
InitializeCriticalSection
lstrcpyA
ResetEvent
SetEvent
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
GetCurrentThreadId
LocalFree
CreateWindowExA
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowThreadProcessId
CloseWindow
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
GetSystemMetrics
SetRect
GetClipboardData
ExitWindowsEx
IsWindow
IsWindowVisible
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
GetFocus
CallNextHookEx
OpenDesktopA
SetWindowsHookExA
UnhookWindowsHookEx
SystemParametersInfoA
SendMessageA
keybd_event
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
DeleteDC
SelectObject
GetPaletteEntries
CreateHalftonePalette
BitBlt
DeleteObject
CreateCompatibleDC
CreateDIBSection
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
SHGetFileInfoA
SHGetSpecialFolderPathA
SHDeleteKeyA
strrchr
_except_handler3
strncpy
realloc
atoi
wcstombs
_beginthreadex
malloc
free
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strchr
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
_strcmpi
strstr
_ftol
ceil
memmove
calloc
??3@YAXPAX@Z
gethostname
connect
getsockname
WSACleanup
WSAStartup
htons
gethostbyname
ntohs
recv
setsockopt
send
select
closesocket
socket
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
MakeSureDirectoryPathExists
ImmGetContext
ImmGetCompositionStringA
ImmReleaseContext
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
URLDownloadToFileA
capGetDriverDescriptionA
capCreateCaptureWindowA
EnumProcessModules
GetModuleFileNameExA
WTSFreeMemory
WTSQuerySessionInformationA
ResetSSDT
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ