DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8627dbf278ce1390054113eda56772b003c48cc6efa0fb01aa572e3753b66490.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8627dbf278ce1390054113eda56772b003c48cc6efa0fb01aa572e3753b66490.dll
Resource
win10v2004-20220901-en
Target
8627dbf278ce1390054113eda56772b003c48cc6efa0fb01aa572e3753b66490
Size
307KB
MD5
54eab373f3dda6a32ecb9e13c74b559a
SHA1
efd7b4a97d7f99973a419a4be4293a7d4113a19a
SHA256
8627dbf278ce1390054113eda56772b003c48cc6efa0fb01aa572e3753b66490
SHA512
d52206de3ae06a0aca57cfb818a770ebdcbe40d921b46a806f6421b99bbf983d94d9b042ee4ca632fb41b3bc5244ff598f06352f21ce9f755b8f605e5ce7faed
SSDEEP
6144:qllCH2WKaDgwPSCL4bwfuE1PXibsnrXQ8n:qllCWWKaDgyX2QuEhM+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DuplicateHandle
OpenProcess
TerminateProcess
SetFileAttributesA
GetFileAttributesA
Sleep
DeleteFileA
WideCharToMultiByte
CreateDirectoryA
GetLocalTime
CopyFileA
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateProcessA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
lstrcpyA
GetShortPathNameA
GetEnvironmentVariableA
GetTickCount
CreateRemoteThread
GetModuleHandleA
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
ResumeThread
HeapFree
HeapAlloc
GetProcessHeap
GetCommandLineA
GetCommandLineW
OpenMutexA
GetTempPathA
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
LockResource
FreeResource
LoadResource
SizeofResource
FindResourceA
LoadLibraryExA
EndUpdateResourceA
UpdateResourceA
GetCurrentProcess
GetLongPathNameA
FindClose
FindNextFileA
FindFirstFileA
GetVolumeInformationA
Toolhelp32ReadProcessMemory
IsBadCodePtr
SetUnhandledExceptionFilter
RaiseException
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
CloseHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
GetLastError
FormatMessageA
LocalFree
SetLastError
GetWindowsDirectoryA
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
GetFileType
GetStdHandle
SetHandleCount
HeapSize
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
HeapCreate
HeapDestroy
ExitProcess
VirtualAlloc
VirtualFree
GetVersion
RtlUnwind
GetTimeZoneInformation
HeapReAlloc
lstrlenA
GetSystemTime
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentDirectoryA
GetFileSize
SetFilePointer
ReadFile
CreateFileA
WriteFile
BeginUpdateResourceA
FindWindowExA
FindWindowA
PostMessageA
wsprintfA
GetWindowThreadProcessId
KillTimer
DefWindowProcA
RegisterClassExA
CreateWindowExA
SetTimer
MessageBoxA
ShowWindow
SetWindowLongA
SendMessageA
EnumChildWindows
GetWindowRect
SetWindowPos
GetParent
GetClassNameA
GetWindowTextA
GetDesktopWindow
IsWindowVisible
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
OpenProcessToken
SetSecurityInfo
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetTokenInformation
LookupAccountSidA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegQueryValueExA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
CommandLineToArgvW
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteExA
SHFileOperationA
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitialize
CLSIDFromString
SysStringLen
LoadRegTypeLi
SysFreeString
SysAllocString
VariantCopy
VariantChangeType
VariantClear
SysAllocStringLen
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ord31
ord16
ord21
ord18
ord57
ord23
ord15
ord32
ord30
ord58
GetModuleFileNameExA
SHDeleteKeyA
Netbios
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ