ServiceMain
sfewgtetert
sfsfsdsf
Static task
static1
Behavioral task
behavioral1
Sample
01181f065adb9321131f38873dd46649.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01181f065adb9321131f38873dd46649.dll
Resource
win10v2004-20231215-en
Target
01181f065adb9321131f38873dd46649
Size
88KB
MD5
01181f065adb9321131f38873dd46649
SHA1
4bcb3a4c74683d968057d80c4c5d8ccc77d50798
SHA256
f0018896d9487d262a8f4ea342552806f179ec964252ce509b7dbda43559c00c
SHA512
a3258aea8c4b596840d7fc2c7aeddc10870a3b1e810ba19a7ad23e9e5524069d4d07993c25fd02e6b0624ab03e6cf8bbc96a3df4b9d930a726019c46a2c766e8
SSDEEP
1536:aU8G49ztBgtFeVNOcTF+dew20BF4WXN/Xru3bHTwrL:t8G0WtFeOiFiewb6WkbHTwv
Checks for missing Authenticode signature.
resource |
---|
01181f065adb9321131f38873dd46649 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitWindowsEx
SendInput
GetThreadDesktop
OpenInputDesktop
PostMessageA
OpenDesktopA
CallNextHookEx
GetForegroundWindow
UnhookWindowsHookEx
SetWindowsHookExW
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
GetMessageA
GetActiveWindow
CharLowerA
CharUpperA
PostThreadMessageA
EnumWindows
UpdateWindow
BringWindowToTop
ShowWindow
DestroyWindow
DispatchMessageA
SetThreadDesktop
MessageBoxA
wsprintfA
SetCursorPos
OpenWindowStationA
SetProcessWindowStation
CloseDesktop
CloseWindowStation
IsWindow
SendMessageA
GetDIBits
GetDeviceCaps
CreateDCA
CreateCompatibleDC
SelectObject
DeleteObject
CreateCompatibleBitmap
DeleteDC
BitBlt
RegCloseKey
CreateServiceA
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
QueryServiceConfigA
EnumServicesStatusA
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
OpenServiceA
GetUserNameW
LookupPrivilegeValueA
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
OpenSCManagerA
DeleteService
ControlService
CloseServiceHandle
ShellExecuteA
SHFileOperationA
SHEmptyRecycleBinA
CreateStreamOnHGlobal
listen
setsockopt
bind
socket
send
connect
select
ntohs
accept
WSAStartup
closesocket
recv
inet_addr
gethostbyname
inet_ntoa
htons
getsockname
StrRChrA
StrChrA
StrStrA
StrCmpW
SHDeleteKeyA
StrCmpNIA
StrToIntA
GetModuleFileNameExA
ImmReleaseContext
ImmGetCompositionStringW
ImmGetCompositionStringA
ImmGetContext
capCreateCaptureWindowA
capGetDriverDescriptionA
waveInUnprepareHeader
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveInStop
waveInClose
waveInOpen
strrchr
__dllonexit
_onexit
_initterm
_adjust_fdiv
malloc
wcscmp
free
strchr
_beginthread
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
OpenProcess
CreateDirectoryA
MoveFileA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetFileAttributesExA
FindClose
GetLastError
FindNextFileA
lstrcmpA
FindFirstFileA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
GetProcAddress
FreeLibrary
LocalAlloc
FlushFileBuffers
RaiseException
lstrlenW
lstrcatW
OpenEventA
OpenMutexA
GetFileSize
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
GetOEMCP
GetLocalTime
GetTempPathA
WriteFile
GetCurrentThread
SetFilePointer
WideCharToMultiByte
SearchPathA
InterlockedExchange
LoadLibraryA
GetModuleFileNameA
GetCurrentProcessId
lstrlenA
DeviceIoControl
CreateFileA
CloseHandle
GetSystemDirectoryA
SetEvent
DeleteFileA
lstrcpyA
GetCurrentThreadId
GetStartupInfoA
CreateProcessA
Sleep
lstrcatA
WaitForSingleObject
GetTickCount
ServiceMain
sfewgtetert
sfsfsdsf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ