Install
RundllInstall
RundllUninstall
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
95bb9d95780c5ab3e1a92005a8dfb3a689aa452b5caa3c7e1335a6b1b98f14e9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
95bb9d95780c5ab3e1a92005a8dfb3a689aa452b5caa3c7e1335a6b1b98f14e9.dll
Resource
win10v2004-20220812-en
Target
95bb9d95780c5ab3e1a92005a8dfb3a689aa452b5caa3c7e1335a6b1b98f14e9
Size
68KB
MD5
a18e1738d1ef5648b789b0202329e8e0
SHA1
1be349e0396de0dbf2a4f76e78a1982b1087f1ae
SHA256
95bb9d95780c5ab3e1a92005a8dfb3a689aa452b5caa3c7e1335a6b1b98f14e9
SHA512
bf53760e37229a66c9f2259eab84bed93b91fc9c37adaba8b1948959d825e6b26879317937df4d010eff179fc3051c9cbaed134b83ca7ec7f8e61a171f371dc7
SSDEEP
1536:11r5yJNJ3FnToIfItdjxsHEF7pcpM57H7SvtyIkfHu48:Pr5yJNJ3tTBfqTsCUM5ivtyIkv
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sleep
ReadFile
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
CloseHandle
CreatePipe
FreeLibrary
GetProcAddress
LoadLibraryA
FindClose
FindNextFileA
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
DeleteFileA
CopyFileA
MoveFileA
GetCurrentProcess
WinExec
SetLastError
lstrlenA
Process32Next
GetPriorityClass
OpenProcess
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
lstrcpyA
WaitForSingleObject
CreateThread
lstrcpynA
MoveFileExA
GetModuleFileNameA
GetTickCount
SetThreadPriority
GetCurrentThread
GetFileSize
CreateFileA
WriteFile
FreeConsole
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
InterlockedExchange
HeapAlloc
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
RaiseException
LocalAlloc
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
_except_handler3
atoi
strcspn
strstr
??3@YAXPAX@Z
wcstombs
rand
srand
malloc
??1type_info@@UAE@XZ
__dllonexit
_onexit
free
_initterm
_adjust_fdiv
strncpy
sprintf
strncat
_strlwr
Install
RundllInstall
RundllUninstall
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ