DllMain
ServiceMain
ShellMain
ShellMainThread
Static task
static1
Behavioral task
behavioral1
Sample
fd913321d4b221811c01bea6e754c08be570eaa26f737fd1021aa96c47fe8722.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd913321d4b221811c01bea6e754c08be570eaa26f737fd1021aa96c47fe8722.dll
Resource
win10v2004-20221111-en
Target
fd913321d4b221811c01bea6e754c08be570eaa26f737fd1021aa96c47fe8722
Size
228KB
MD5
b4e9a90418f4453674883d2c0feb6b46
SHA1
78fdb00175ebc48d5377caf2044e6eb79fc2ce39
SHA256
fd913321d4b221811c01bea6e754c08be570eaa26f737fd1021aa96c47fe8722
SHA512
e80078e514f73e13df9fd290c7c380e38ae062c15b22c724038d3756fe9b26da859cad0e09fac90dbe4820cd66c5b6d387e00382feca7721692a48cab05d62e3
SSDEEP
3072:qQBKxYQ4JNTJkflWyFGcT4BCfD+O2TJQeaKm7HRrc86pNm/q1RlGo3BV0Qj:qmKxYxJJOAZWDfreZm7HW86pNn1rBV
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LocalFree
FormatMessageA
CreateEventA
InterlockedExchange
GetACP
GetLocaleInfoA
GetModuleHandleA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
CompareStringW
CompareStringA
SetStdHandle
VirtualProtect
QueryPerformanceCounter
GetStringTypeW
GetStringTypeA
LCMapStringW
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
FlushFileBuffers
ReadFile
WriteFile
SetFilePointerEx
SetEndOfFile
GetFileSizeEx
GetCommandLineA
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetSystemInfo
GetVolumeInformationA
GetDiskFreeSpaceExA
GetVersionExA
ProcessIdToSessionId
DeleteCriticalSection
SetErrorMode
InitializeCriticalSection
MoveFileExA
GetSystemDirectoryA
DisableThreadLibraryCalls
LCMapStringA
GetModuleFileNameA
CreateThread
SetLastError
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
CreateToolhelp32Snapshot
Process32First
Sleep
Process32Next
CloseHandle
GlobalMemoryStatus
CreatePipe
GetStartupInfoA
PeekNamedPipe
MoveFileA
GetDriveTypeA
GetLastError
SetFileTime
SetFileAttributesA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcessId
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
VirtualQuery
HeapSize
GetCurrentProcess
TerminateProcess
HeapReAlloc
ExitProcess
GetCPInfo
GetOEMCP
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
GetCurrentThreadId
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
RtlUnwind
SetEnvironmentVariableA
GetCursorPos
SystemParametersInfoA
SetClipboardData
EmptyClipboard
CloseClipboard
GetClipboardData
keybd_event
MapVirtualKeyA
mouse_event
GetDesktopWindow
CloseDesktop
SwitchDesktop
OpenDesktopA
GetUserObjectInformationA
OpenInputDesktop
PostMessageA
GetClassNameA
FindWindowA
EnumDesktopWindows
GetWindowRect
SetThreadDesktop
ReleaseDC
GetThreadDesktop
GetWindowDC
OpenClipboard
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
CreateCompatibleBitmap
GdiFlush
GetObjectA
CreateBitmap
SelectObject
SetPixel
GetBitmapBits
BitBlt
GetDIBits
GetSystemPaletteEntries
CreatePalette
SelectPalette
DeleteObject
RealizePalette
CreateDCA
GetDeviceCaps
DeleteDC
CreateCompatibleDC
RevertToSelf
RegOpenKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateProcessAsUserA
FreeSid
GetKernelObjectSecurity
GetSecurityDescriptorDacl
SetEntriesInAclA
MakeAbsoluteSD
SetSecurityDescriptorDacl
ImpersonateLoggedOnUser
SetKernelObjectSecurity
AllocateAndInitializeSid
BuildTrusteeWithSidA
DuplicateTokenEx
SetTokenInformation
OpenProcessToken
GetTokenInformation
LookupAccountSidA
SetServiceStatus
CommandLineToArgvW
SHFileOperationA
CoInitialize
CoCreateInstance
ntohs
inet_ntoa
getpeername
inet_addr
WSACleanup
shutdown
htons
gethostname
__WSAFDIsSet
send
WSAIoctl
getsockname
ntohl
WSAGetLastError
WSADuplicateSocketA
select
recvfrom
gethostbyname
NetApiBufferFree
NetUserEnum
NetUserDel
NetUserSetInfo
NetLocalGroupAddMembers
NetUserAdd
GetModuleBaseNameA
GetModuleFileNameExA
EnumProcessModules
EnumProcesses
WTSQuerySessionInformationA
WTSFreeMemory
DestroyEnvironmentBlock
CreateEnvironmentBlock
DllMain
ServiceMain
ShellMain
ShellMainThread
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ