DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
acc8b15116258d6285abc0ad5c5cd4bdc351cbae0ffc6d59745cdab776cbf6aa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acc8b15116258d6285abc0ad5c5cd4bdc351cbae0ffc6d59745cdab776cbf6aa.dll
Resource
win10v2004-20220812-en
Target
acc8b15116258d6285abc0ad5c5cd4bdc351cbae0ffc6d59745cdab776cbf6aa
Size
92KB
MD5
6ccac8438092d7f417d7b78d5e380db1
SHA1
4871f6f7a6079f199ab032d464daa9b8b6ef8b53
SHA256
acc8b15116258d6285abc0ad5c5cd4bdc351cbae0ffc6d59745cdab776cbf6aa
SHA512
4589616c0cff75a575e4ca232419a4d73613bd0328b228f8627a163523a09ef94bec41270360db15105f26f5757c4d35aab3ed8a22c2dd9ac3e60eb288f5c641
SSDEEP
1536:GFz4GNsNO+H29cOL+Nxw480MUqOsyooVceMiqt3TCPVXNNiyr:gKynl30MUqXyooCeMi43TAXNNi2
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetStartupInfoA
GetCompressedFileSizeW
ExpandEnvironmentStringsW
WaitNamedPipeA
EnumSystemLocalesA
CreateRemoteThread
WaitForSingleObjectEx
GetLongPathNameW
HeapValidate
FillConsoleOutputCharacterW
LockResource
CreateProcessW
FindResourceA
GetProfileIntA
LocalLock
lstrcmpW
CreatePipe
CreateTimerQueueTimer
CreateMailslotA
GetDiskFreeSpaceW
HeapReAlloc
SetFilePointerEx
GlobalFree
InterlockedCompareExchange
GlobalGetAtomNameA
IsBadCodePtr
GetDriveTypeW
CreateEventA
lstrcpynW
SetLocalTime
WriteProfileStringA
GetExitCodeThread
TransactNamedPipe
GetDateFormatW
WriteProfileStringW
VerifyVersionInfoA
GetProfileStringA
WinExec
UnregisterWait
GetTempPathA
GetFileType
GetBinaryTypeA
FindFirstChangeNotificationA
GetProfileSectionA
IsBadHugeReadPtr
AddAtomA
GetDefaultCommConfigW
SetFileAttributesA
ConnectNamedPipe
GetExitCodeProcess
OpenSemaphoreW
GetConsoleOutputCP
lstrcpyA
GetVersionExW
CreateFileW
CreateDirectoryW
GlobalMemoryStatusEx
GetStdHandle
PeekConsoleInputA
SetConsoleCtrlHandler
LockFile
FindAtomW
GetUserDefaultLCID
PulseEvent
GetProcessVersion
GetCurrentThreadId
LocalFileTimeToFileTime
GetShortPathNameW
FindNextChangeNotification
Beep
GetEnvironmentStringsW
SetConsoleTitleA
HeapLock
SetProcessShutdownParameters
CreateToolhelp32Snapshot
GetStringTypeW
UnlockFile
CreateWaitableTimerA
ReadConsoleW
CompareStringW
ExitThread
DuplicateHandle
GetModuleFileNameW
TerminateThread
LocalAlloc
GetSystemInfo
OpenFileMappingA
GetDriveTypeA
GetSystemWindowsDirectoryA
GetStringTypeA
GetTimeFormatW
FormatMessageA
FindNextVolumeMountPointW
FindResourceExA
CreateIoCompletionPort
OpenFileMappingW
GetSystemDirectoryW
OpenMutexW
HeapUnlock
IsBadWritePtr
PurgeComm
GetFileAttributesExW
OpenJobObjectW
SetHandleInformation
GetThreadPriority
ClearCommError
SetStdHandle
ReadConsoleA
GetDiskFreeSpaceA
GetCurrentThread
GetShortPathNameA
GetHandleInformation
IsBadHugeWritePtr
SetVolumeLabelW
GetFileAttributesExA
CopyFileW
LoadResource
GetFileAttributesW
DisconnectNamedPipe
VerifyVersionInfoW
GetVolumePathNameW
DeleteFileA
MapViewOfFile
CreateFileMappingA
InitializeCriticalSection
WaitForSingleObject
VirtualProtect
HeapFree
GetModuleFileNameA
GetLastError
ReleaseMutex
GetModuleHandleA
InterlockedExchange
LeaveCriticalSection
HeapAlloc
CreateFileA
GetProcAddress
CopyFileA
GetTickCount
CreateThread
GetCurrentProcessId
Sleep
VirtualQuery
CreateProcessA
EnterCriticalSection
GetComputerNameA
WideCharToMultiByte
LoadLibraryA
CoGetMalloc
StgOpenStorage
StgCreateDocfileOnILockBytes
OleGetAutoConvert
OleCreateLinkToFile
OleCreateLinkFromData
CoRevertToSelf
CreateDataCache
GetHGlobalFromStream
StgIsStorageFile
OleCreate
OleDestroyMenuDescriptor
CoAllowSetForegroundWindow
CoLockObjectExternal
OleLoadFromStream
IIDFromString
CoTaskMemAlloc
CoInitialize
CoTaskMemFree
CoUninitialize
CoCreateInstance
ReadFmtUserTypeStg
OleIsRunning
OleSaveToStream
OleCreateLink
OleSetContainedObject
CoTaskMemRealloc
CoImpersonateClient
CreateItemMoniker
CreateDataAdviseHolder
CoMarshalInterface
OleSetMenuDescriptor
OleTranslateAccelerator
RegUnLoadKeyW
DeregisterEventSource
EnumServicesStatusW
ConvertSidToStringSidA
RegEnumKeyExA
RegCreateKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegSetValueExA
SetNamedSecurityInfoA
RegOpenKeyExA
LookupAccountNameA
GetUserNameA
EnumServicesStatusExW
QueryServiceConfigA
EnumServicesStatusA
CreateProcessAsUserA
RegOpenKeyW
ImpersonateNamedPipeClient
RegQueryValueW
QueryServiceStatus
RegisterServiceCtrlHandlerA
CreateServiceA
OpenProcessToken
IsTextUnicode
RegRestoreKeyW
ReadEventLogA
GetAclInformation
RegSaveKeyW
RegDeleteValueA
ReportEventA
GetEffectiveRightsFromAclW
QueryServiceLockStatusW
RegEnumKeyExW
RegSetValueW
StartServiceW
OpenEventLogA
GetServiceDisplayNameW
CloseEventLog
RegCreateKeyA
EnumDependentServicesA
OpenServiceA
OpenThreadToken
ReportEventW
MapGenericMask
IsTokenRestricted
SHAddToRecentDocs
SHGetFolderPathAndSubDirW
SHFormatDrive
SHChangeNotify
ExtractIconW
SHBrowseForFolderA
ShellExecuteExA
DragQueryFileA
SHPathPrepareForWriteW
SHGetInstanceExplorer
SHGetFolderPathA
ShellAboutW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ