DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
791e4390bbebd675d5cd6ddf5f8e34f457a916b75a668e295d49021fbd64fbdc.dll
Resource
win7-20220812-en
Target
791e4390bbebd675d5cd6ddf5f8e34f457a916b75a668e295d49021fbd64fbdc
Size
276KB
MD5
03faa420b09b4dbff7eba1a7defc1182
SHA1
d387564a4ec5a08cee7afa6c707f65d9b49a96a9
SHA256
791e4390bbebd675d5cd6ddf5f8e34f457a916b75a668e295d49021fbd64fbdc
SHA512
98cd96cb38ca02017865be212c9d8d885fb2d1d4288b75c8f2014ec3486404d5d33b85b7c4ed1e362b28026ad3cdb2d60ae9f3849c04bb8df6cf7280d8288b6c
SSDEEP
3072:IdgW8CWbpIroYa9bRPVMO13zIhaJ526326AQsTO9JkokZms0kr6IC7e3:ImW8CWbija7VMO13zKaJ063RPs9r6P7
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
OpenProcess
TerminateProcess
SetFileAttributesA
GetFileAttributesA
Sleep
DeleteFileA
WideCharToMultiByte
CreateDirectoryA
GetLocalTime
CopyFileA
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateProcessA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
lstrcpyA
GetShortPathNameA
GetEnvironmentVariableA
GetTickCount
GetSystemTime
CreateRemoteThread
GetModuleHandleA
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
ResumeThread
HeapFree
HeapAlloc
GetProcessHeap
GetCommandLineA
GetCommandLineW
OpenMutexA
GetTempPathA
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
LockResource
FreeResource
LoadResource
SizeofResource
FindResourceA
LoadLibraryExA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
DuplicateHandle
FindClose
FindNextFileA
FindFirstFileA
GetVolumeInformationA
ExitProcess
GetCurrentProcessId
Toolhelp32ReadProcessMemory
IsBadCodePtr
SetUnhandledExceptionFilter
RaiseException
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetCurrentProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
GetLastError
FormatMessageA
LocalFree
SetLastError
GetWindowsDirectoryA
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapSize
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
HeapCreate
HeapDestroy
VirtualAlloc
VirtualFree
GetVersion
RtlUnwind
GetTimeZoneInformation
HeapReAlloc
lstrlenA
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentDirectoryA
GetFileSize
SetFilePointer
ReadFile
CreateFileA
WriteFile
GetLongPathNameA
CloseHandle
wsprintfA
PostMessageA
KillTimer
FindWindowExA
GetWindowThreadProcessId
FindWindowA
DefWindowProcA
RegisterClassExA
CreateWindowExA
SetTimer
MessageBoxA
ShowWindow
SetWindowLongA
SendMessageA
IsWindowVisible
GetWindowRect
SetWindowPos
GetParent
GetClassNameA
GetWindowTextA
GetDesktopWindow
EnumChildWindows
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
OpenProcessToken
SetSecurityInfo
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegDeleteValueA
RegEnumValueA
RegCloseKey
RegQueryInfoKeyA
LookupAccountSidA
GetTokenInformation
SHChangeNotify
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
CommandLineToArgvW
ShellExecuteExA
SHGetPathFromIDListA
CoUninitialize
CoInitialize
CoCreateGuid
CoCreateInstance
CLSIDFromString
SysFreeString
SysStringLen
LoadRegTypeLi
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
VariantChangeType
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ord16
ord21
ord18
ord57
ord23
ord15
ord32
ord30
ord31
ord58
GetModuleFileNameExA
SHDeleteKeyA
Netbios
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ