RundllInstallA
RundllUninstallA
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
d4cc84fe34a2cb8418bc3af6477308b2139d5fa81fee475ea84bd3b74f4aa5cf.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d4cc84fe34a2cb8418bc3af6477308b2139d5fa81fee475ea84bd3b74f4aa5cf.dll
Resource
win10v2004-20220901-en
Target
d4cc84fe34a2cb8418bc3af6477308b2139d5fa81fee475ea84bd3b74f4aa5cf
Size
581KB
MD5
abe9c08fb5a67d30ad8a4f9d6d514787
SHA1
05c3dfeb9278ba69fcc543d31d0df4d1127b6ff3
SHA256
d4cc84fe34a2cb8418bc3af6477308b2139d5fa81fee475ea84bd3b74f4aa5cf
SHA512
8d269f10ff6653f8cd727df3727386b508274714622013e518949621fb591a7409ef6a307910d826d832a6aab7dad70b81e895492fce3a2645f3f96f2e7ce5c7
SSDEEP
6144:eIihNQti5zR2ZZDe/Sv8EKc6qRKvLl5dTueOaxiXsVFQKePXmvzkB+qtEM9r4wVF:e9QtQ4ZuEr8Lr/oPXNt1QJ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_crt_debugger_hook
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
sprintf
_stat32
_initterm
_decode_pointer
_encoded_null
_malloc_crt
_encode_pointer
_except_handler4_common
wcstombs
fwrite
rand
srand
atof
_atoi64
atoi
strncat
atol
_vsnprintf
_strtime
_strdate
__iob_func
fprintf
fwprintf
fopen
fseek
_gmtime32
strstr
signal
fputs
strtoul
sscanf
isupper
tolower
_fileno
fread
strncpy
fclose
memcpy
_CxxThrowException
__CxxFrameHandler3
_wcsnicmp
_stricmp
abort
wcsstr
vfprintf
memchr
getenv
qsort
strcmp
isdigit
_ftol
isspace
_errno
fflush
_setmode
ftell
fgets
isxdigit
strncmp
memmove
_time32
_snprintf
_time64
strchr
??2@YAPAXI@Z
??3@YAXPAX@Z
realloc
free
memset
malloc
_onexit
_getch
GetVersion
GetFileType
FlushConsoleInputBuffer
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
FreeConsole
GetTempPathA
GetWindowsDirectoryA
CopyFileA
DeleteFileA
CloseHandle
GetCurrentProcess
GetCurrentProcessId
GetProcAddress
LoadLibraryA
GetDiskFreeSpaceA
GetDriveTypeA
GlobalMemoryStatus
GetTickCount
GetSystemPowerStatus
GetVersionExA
GetSystemInfo
GetComputerNameA
GetModuleHandleA
GetLastError
OpenProcess
Sleep
TerminateProcess
MultiByteToWideChar
WideCharToMultiByte
SetLastError
ExitThread
ReadFile
PeekNamedPipe
WriteFile
GetSystemDirectoryA
FreeLibrary
OutputDebugStringA
GetStdHandle
SetFilePointer
GetFileSize
CreateFileA
GetModuleFileNameA
TerminateThread
CreateThread
CreateProcessA
GetStartupInfoA
CreatePipe
GetProcessWindowStation
GetDesktopWindow
wsprintfA
GetUserObjectInformationW
MessageBoxA
RegisterServiceCtrlHandlerA
LookupPrivilegeValueA
OpenProcessToken
GetUserNameA
LookupAccountSidA
GetTokenInformation
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetServiceStatus
RegCreateKeyA
RegSetValueExA
CloseServiceHandle
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CreateServiceA
OpenSCManagerA
DeleteService
AdjustTokenPrivileges
LogonUserA
CreateProcessAsUserA
OpenServiceA
WSASetLastError
send
WSAStartup
gethostbyname
inet_ntoa
gethostname
recv
htons
inet_addr
connect
select
__WSAFDIsSet
shutdown
closesocket
socket
WSAGetLastError
WSACleanup
NetServerEnum
NetApiBufferFree
InternetGetConnectedState
RundllInstallA
RundllUninstallA
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ