MainWork01
Service01
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
51c67d286e2ec298c5963e061cb84565b7bdd08ff7e58d04d315e4ccd5983b83.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
51c67d286e2ec298c5963e061cb84565b7bdd08ff7e58d04d315e4ccd5983b83.dll
Resource
win10v2004-20221111-en
Target
51c67d286e2ec298c5963e061cb84565b7bdd08ff7e58d04d315e4ccd5983b83
Size
65KB
MD5
721a298f3e0c1610b341c306e0e38460
SHA1
d787a5fec66b7f10c91b7153543a089aa2640b73
SHA256
51c67d286e2ec298c5963e061cb84565b7bdd08ff7e58d04d315e4ccd5983b83
SHA512
c511028b96387ebe3539e6b0017cae3e18d1c09ae24d99acc7fbbd73103f70c55df3dac8517d52115420f579e18298b6ab32dab2f530aeb23759179b7a9f111f
SSDEEP
768:cXG+H+uCMQKrETLm7lC/2d4z3ns4zaXE3cxuWSWOqfukmKKUGDdSK18jYx5EsfxH:QeuCMlJ7lCeWXs4za0EduW5A8lExruu
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitWindowsEx
CallNextHookEx
OpenInputDesktop
GetThreadDesktop
GetMessageA
SetTimer
SetWindowsHookExA
SendInput
SetCursorPos
PostMessageA
OpenDesktopA
GetForegroundWindow
SetWindowsHookExW
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
GetActiveWindow
CharLowerA
CharUpperA
PostThreadMessageA
EnumWindows
UpdateWindow
BringWindowToTop
ShowWindow
DestroyWindow
DispatchMessageA
SetThreadDesktop
MessageBoxA
wsprintfA
UnhookWindowsHookEx
OpenWindowStationA
SetProcessWindowStation
CloseDesktop
CloseWindowStation
IsWindow
SendMessageA
DeleteObject
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetDeviceCaps
CreateDCA
CreateCompatibleBitmap
GetDIBits
RegCloseKey
CreateServiceA
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
QueryServiceConfigA
EnumServicesStatusA
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
OpenServiceA
GetUserNameW
LookupPrivilegeValueA
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
OpenSCManagerA
DeleteService
ControlService
CloseServiceHandle
ShellExecuteA
SHFileOperationA
SHEmptyRecycleBinA
CreateStreamOnHGlobal
listen
setsockopt
bind
socket
htons
send
connect
select
ntohs
accept
WSADuplicateSocketA
WSAStartup
closesocket
recv
inet_addr
gethostbyname
inet_ntoa
WSASocketA
getsockname
StrCmpW
StrChrA
StrStrA
StrRChrA
SHDeleteKeyA
StrCmpNIA
StrToIntA
GetModuleFileNameExA
ImmReleaseContext
ImmGetCompositionStringW
ImmGetCompositionStringA
ImmGetContext
ca
waveInUnprepareHeader
malloc
strrchr
__dllonexit
_onexit
_initterm
_adjust_fdiv
wcscmp
free
strchr
_beginthread
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
lstrlenW
FlushFileBuffers
CreateDirectoryA
MoveFileA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetFileAttributesExA
FindClose
GetLastError
lstrcmpA
FindNextFileA
FindFirstFileA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
ExitProcess
GetCommandLineA
GetProcAddress
FreeLibrary
LocalAlloc
SetFilePointer
RaiseException
lstrcatW
OpenEventA
OpenMutexA
GetFileSize
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
GetVersionExA
TerminateProcess
ResumeThread
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
GetOEMCP
GetLocalTime
GetTempPathA
WriteFile
GetCurrentThread
GetCurrentProcessId
WideCharToMultiByte
SearchPathA
GetModuleFileNameA
InterlockedExchange
LoadLibraryA
OpenProcess
lstrlenA
DeviceIoControl
CreateFileA
CloseHandle
GetSystemDirectoryA
SetEvent
DeleteFileA
lstrcpyA
GetCurrentThreadId
GetStartupInfoA
CreateProcessA
Sleep
lstrcatA
WaitForSingleObject
GetTickCount
MainWork01
Service01
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ