DoMainWork
DoService
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
61e1d0db02d9a6b3b943230bc85239636ef8d7a73c9282bd20659c38bf97c675.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61e1d0db02d9a6b3b943230bc85239636ef8d7a73c9282bd20659c38bf97c675.dll
Resource
win10v2004-20220812-en
Target
61e1d0db02d9a6b3b943230bc85239636ef8d7a73c9282bd20659c38bf97c675
Size
57KB
MD5
bbc8c516bf2056aafe695d85f50a2f70
SHA1
4e42b43c3b3fa12338a918cd4f628c7aa93b6d39
SHA256
61e1d0db02d9a6b3b943230bc85239636ef8d7a73c9282bd20659c38bf97c675
SHA512
5e335f3365ba9124d8369f4fb4ec959db06aa477a26ecb39f2f970f51c1c040e448060390f56b434f22110eea53f188f260c3cd57da5607ea62aa92adfc9260b
SSDEEP
768:JGB6Dq6A7doms6X8N4R5+lxfuqpmzSslUrHIv4QyhnU/QdOL92ovAg+eyDeL:eWqp7q+X8qR5+lx5vr1TjdOxXyDM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitWindowsEx
SetThreadDesktop
GetActiveWindow
GetUserObjectInformationA
EnumChildWindows
SetWindowsHookExW
GetForegroundWindow
OpenWindowStationA
SetProcessWindowStation
CreateDesktopA
SetWindowsHookExA
CallNextHookEx
UnhookWindowsHookEx
IsWindow
SendMessageA
DestroyWindow
GetMessageA
DispatchMessageA
ShowWindow
BringWindowToTop
UpdateWindow
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
CharUpperA
wsprintfA
OpenDesktopA
PostMessageA
SetCursorPos
SendInput
GetThreadDesktop
OpenInputDesktop
MessageBoxA
DeleteDC
GetDeviceCaps
CreateDCA
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetDIBits
BitBlt
SelectObject
RegCreateKeyExA
LookupPrivilegeValueA
OpenProcessToken
ImpersonateSelf
OpenThreadToken
ChangeServiceConfigA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegQueryValueExA
CreateServiceA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
QueryServiceConfigA
EnumServicesStatusA
DeleteService
ControlService
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
AdjustTokenPrivileges
SHEmptyRecycleBinA
ShellExecuteA
SHFileOperationA
CreateStreamOnHGlobal
connect
socket
bind
setsockopt
listen
accept
ntohs
getsockname
select
recv
send
WSASocketA
WSADuplicateSocketA
WSAStartup
inet_addr
gethostbyname
inet_ntoa
closesocket
htons
SHDeleteKeyA
StrCmpNIA
StrRChrA
StrStrA
StrCmpW
StrToIntA
StrChrA
EnumProcesses
GetModuleFileNameExA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
ImmGetCompositionStringW
ImmGetCompositionStringA
ImmReleaseContext
ImmGetContext
_adjust_fdiv
_initterm
strstr
strchr
malloc
wcscmp
free
__CxxFrameHandler
_beginthread
??2@YAPAXI@Z
??3@YAXPAX@Z
capCreateCaptureWindowA
capGetDriverDescriptionA
GetLastError
lstrcmpA
FindNextFileA
FindFirstFileA
lstrcmpiA
GetCurrentProcessId
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
CreateProcessA
DeviceIoControl
GetOEMCP
GetACP
GetComputerNameA
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
GetVersion
QueryPerformanceCounter
GetDriveTypeA
lstrcpyA
MoveFileA
FindClose
LoadLibraryA
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetProcAddress
CreateThread
GetFileAttributesA
ExitProcess
lstrlenW
WideCharToMultiByte
GetLocalTime
GetSystemDirectoryA
GetModuleFileNameA
GetStartupInfoA
CallNamedPipeA
OpenEventA
lstrcatA
CreateNamedPipeA
ConnectNamedPipe
FlushFileBuffers
WriteFile
GetTempPathA
SetPriorityClass
lstrlenA
GetFileSize
DeleteFileA
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
GetCurrentThreadId
DisconnectNamedPipe
SetFilePointer
GetPriorityClass
GetCurrentThread
GetThreadPriority
SetEvent
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
CreateDirectoryA
GetFileAttributesExA
Sleep
WaitForSingleObject
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
CreateFileA
GetFileSizeEx
SetFilePointerEx
ReadFile
CloseHandle
GetTickCount
QueryPerformanceFrequency
SetThreadPriority
DoMainWork
DoService
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ