ServiceMain
ServiceMainEx
WlxEntry
Static task
static1
Behavioral task
behavioral1
Sample
b221dc624e5fe9e277de1b71d24d739e1afb5292a14a76dacc5bb86856fe8d0c.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b221dc624e5fe9e277de1b71d24d739e1afb5292a14a76dacc5bb86856fe8d0c.dll
Resource
win10v2004-20221111-en
Target
b221dc624e5fe9e277de1b71d24d739e1afb5292a14a76dacc5bb86856fe8d0c
Size
53KB
MD5
0d4d4a2a8c6708388fbe5e6629494426
SHA1
e48cbb3fa40dac6680839a60f465da7f72251fba
SHA256
b221dc624e5fe9e277de1b71d24d739e1afb5292a14a76dacc5bb86856fe8d0c
SHA512
b1999ad5344f65e2925548baa14e1eea3d815705ef44ca64c1a8b42a5667da8e45970570b02616e0c4233851c61e93a7a33db645d97ac9a1dc24ca814c1f636e
SSDEEP
768:T/k0hbl6VPrPmORgj46Z/wrOjOFwJxkEXkRJ8NeJRCvCuovQrSmLBfQFwLS:Npl6VzPRt6RGw0PRCvCuo0S6YFn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteFileA
FindFirstFileA
GetVolumeInformationA
GetDriveTypeA
GetLogicalDrives
GetComputerNameA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileA
FindClose
GetEnvironmentVariableA
LoadLibraryA
LocalFree
LocalAlloc
GetLastError
Sleep
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetFileTime
ReadFile
GetFullPathNameA
WriteFile
GetTempFileNameA
GetTempPathA
GetDateFormatA
GetTimeFormatA
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
GetSystemTime
FindNextFileA
WinExec
ReleaseSemaphore
ResumeThread
SetThreadContext
VirtualFree
GetThreadContext
VirtualAlloc
VirtualAllocEx
CreateProcessA
FreeLibrary
GetProcAddress
MoveFileExA
MoveFileA
CopyFileA
GetSystemDirectoryA
GetTickCount
GetExitCodeProcess
PeekNamedPipe
GetStartupInfoA
CreatePipe
lstrcpyA
lstrcpynA
DisableThreadLibraryCalls
CreateSemaphoreA
InterlockedDecrement
InterlockedIncrement
WaitForSingleObject
SetEvent
CreateEventA
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
lstrcmpiA
VirtualProtect
GetCurrentProcess
WriteProcessMemory
GetSystemTimeAsFileTime
VirtualQuery
OutputDebugStringA
HeapFree
GetProcessHeap
HeapAlloc
lstrlenA
CreateThread
CloseHandle
TerminateProcess
MessageBoxA
wvsprintfA
RegCreateKeyA
RegNotifyChangeKeyValue
RegEnumValueA
RegDeleteValueA
RegSetValueExA
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
GetTokenInformation
LookupAccountSidA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
CreateStreamOnHGlobal
NtFreeVirtualMemory
_strcmpi
strchr
NtQuerySystemInformation
memmove
NtOpenProcess
NtClose
_strlwr
strstr
memset
_aulldiv
memcpy
RtlUnwind
NtAllocateVirtualMemory
_allmul
htonl
gethostbyaddr
gethostname
WSAStartup
ioctlsocket
WSAGetLastError
select
shutdown
setsockopt
closesocket
socket
htons
accept
connect
bind
listen
getsockname
send
recv
inet_addr
gethostbyname
__WSAFDIsSet
DnsQuery_A
DnsRecordListFree
ord19
ord13
ord135
ord138
ord11
ord21
ord23
ord140
ord129
ord17
ord75
RasEnumConnectionsA
StrToIntA
StrChrA
StrCmpNA
StrStrA
ServiceMain
ServiceMainEx
WlxEntry
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ