DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ae5c6da441bacb0495f974463361432af4c46d79d4d22dc2fe80192e5602a61f.dll
Resource
win7-20220812-en
Target
ae5c6da441bacb0495f974463361432af4c46d79d4d22dc2fe80192e5602a61f
Size
801KB
MD5
660cc8241cd6c037ea0f8a7bdac10cd0
SHA1
04a4d177b3f17243f92da99eb7cf41b02997bd05
SHA256
ae5c6da441bacb0495f974463361432af4c46d79d4d22dc2fe80192e5602a61f
SHA512
67526f767e43b5a66a620c75c96e08b455b172f5ed5de2e1c8fccd89ddfbfbaf96bbd8a515805187631e2b5b5f454fd227044ff8bccf2a301b72ca2088441d98
SSDEEP
12288:J7ei6CQkeVnnyWiw1E6X93nZHaEFeQsJ+H9zsfOO5b0HNoW+szOOI3Je:RelkeVnyXw1/tXQKrH9YG37O93Je
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
UuidToStringA
RpcStringFreeA
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
GlobalUnlock
GlobalLock
Sleep
lstrcpynA
lstrcpynW
WideCharToMultiByte
lstrlenW
RaiseException
SetEnvironmentVariableA
CompareStringW
FlushFileBuffers
CreateFileW
SetStdHandle
InterlockedExchange
GetTimeZoneInformation
LCMapStringW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
DeleteCriticalSection
IsDBCSLeadByte
lstrcmpiA
LoadLibraryExA
FindResourceA
LoadResource
MultiByteToWideChar
SizeofResource
GetModuleFileNameA
lstrlenA
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
GetLastError
GetVersion
GetLocaleInfoA
DisableThreadLibraryCalls
GetVersionExA
GetACP
LoadLibraryA
GetProcAddress
FreeLibrary
HeapQueryInformation
HeapFree
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
HeapSize
GetConsoleMode
GetConsoleCP
SetFilePointer
GetProcessHeap
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
HeapReAlloc
HeapAlloc
GetLocaleInfoW
SetConsoleCtrlHandler
ExitProcess
GetFileType
WriteConsoleW
WriteFile
GetStdHandle
SetHandleCount
HeapDestroy
GetCurrentProcessId
CloseHandle
SetEvent
OpenEventA
OutputDebugStringA
OutputDebugStringW
WaitForSingleObject
GetCurrentThreadId
VirtualAlloc
UnmapViewOfFile
GetSystemInfo
MapViewOfFile
CreateFileMappingA
GetCurrentThread
OpenFileMappingA
GetModuleFileNameW
FindFirstFileExA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
DecodePointer
EncodePointer
VirtualProtect
VirtualQuery
HeapValidate
IsBadReadPtr
GetCommandLineA
FatalAppExitA
IsDebuggerPresent
LoadLibraryW
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapCreate
CharNextW
CharNextA
UnregisterClassA
MsgWaitForMultipleObjectsEx
PeekMessageA
IsWindowUnicode
GetMessageW
GetPropA
SetForegroundWindow
LoadImageA
EnumWindows
GetSysColor
LoadBitmapA
LoadStringA
CreateMenu
InsertMenuA
SetMenuItemBitmaps
GetMessageA
DispatchMessageA
DispatchMessageW
TranslateMessage
wsprintfA
SelectObject
GetObjectA
GetPixel
SetPixel
GetCurrentObject
DeleteDC
CreateCompatibleDC
RevertToSelf
RegQueryInfoKeyA
RegQueryInfoKeyW
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegCreateKeyExA
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SetThreadToken
OpenThreadToken
DragQueryFileA
ShellExecuteExA
CoTaskMemAlloc
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
ReleaseStgMedium
CoTaskMemFree
CoReleaseMarshalData
CoMarshalInterface
CreateStreamOnHGlobal
CoUnmarshalInterface
CoRevokeClassObject
CoRegisterClassObject
UnRegisterTypeLi
SysAllocString
RegisterTypeLi
SysStringLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
VarUI4FromStr
PathFileExistsA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE