DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RegisterSendto
RouteTheCall
Static task
static1
Behavioral task
behavioral1
Sample
8f130d86d5cda41b5555c1c403adf74d825a84102292c9c946522cefadfe6525.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f130d86d5cda41b5555c1c403adf74d825a84102292c9c946522cefadfe6525.dll
Resource
win10v2004-20220901-en
Target
8f130d86d5cda41b5555c1c403adf74d825a84102292c9c946522cefadfe6525
Size
320KB
MD5
6706c37da751eb57af458c718e6d1a7d
SHA1
0d98359aa5430f452e8e70c460387f38500ae093
SHA256
8f130d86d5cda41b5555c1c403adf74d825a84102292c9c946522cefadfe6525
SHA512
86d5ee873e154c4880ae3a156ad1bc262ae398822edde9467ff1c7b4cab2357fb2784089240dde231531e75a8ade584e82d80de9ef77ae3885c5ab5ef19abcb1
SSDEEP
6144:XfoIdVPoDwgZZ6XwicFde6B7CL+uz1HO6s+3k5Ef:voIdVqzhiMhIHVOyUCf
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RtlUnwind
SetCurrentDirectoryW
LeaveCriticalSection
EnterCriticalSection
GetCurrentDirectoryW
RemoveDirectoryW
CreateThread
LocalFree
FormatMessageW
GetLastError
DeleteFileW
CopyFileW
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
FreeLibrary
GetProcAddress
LoadLibraryW
FindNextFileW
CloseHandle
CreateFileW
FileTimeToSystemTime
CreateDirectoryW
CompareFileTime
GetFileTime
lstrcmpiW
GlobalUnlock
GlobalLock
lstrcmpW
lstrcpynW
LocalAlloc
GetCalendarInfoW
TlsSetValue
TlsGetValue
TlsAlloc
TlsFree
GetDiskFreeSpaceExW
MultiByteToWideChar
lstrlenA
GetTempPathW
GetFileSizeEx
GetDriveTypeW
GlobalFree
lstrcpyW
GlobalAlloc
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
GetFileInformationByHandle
GlobalSize
GetProcessHeap
HeapFree
HeapReAlloc
HeapAlloc
ReadFile
WriteFile
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetFileAttributesA
SetLastError
ExitProcess
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FindFirstFileW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
GetACP
GetOEMCP
GetCPInfo
UnhandledExceptionFilter
VirtualAlloc
LoadLibraryA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
InterlockedExchange
VirtualQuery
VirtualProtect
GetSystemInfo
GetTimeZoneInformation
SetFilePointer
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
FindClose
GetFileAttributesW
SetFileAttributesW
lstrlenW
ExitThread
SetFileAttributesA
CreateDirectoryA
LocalLock
LocalUnlock
lstrcmpiA
IsDBCSLeadByte
FindFirstFileA
FileTimeToDosDateTime
DeleteFileA
GlobalReAlloc
CreateFileA
GetDriveTypeA
GlobalHandle
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetWindowsDirectoryW
GetSystemTimeAsFileTime
QueryPerformanceCounter
DosDateTimeToFileTime
FileTimeToLocalFileTime
GetTickCount
GetCurrentProcessId
GetModuleFileNameW
GetFileSize
MoveFileA
SetVolumeLabelA
FindNextFileA
GetDiskFreeSpaceA
RemoveDirectoryA
SetCurrentDirectoryA
lstrcmpA
GetSystemWindowsDirectoryW
LoadLibraryExA
GetVolumeInformationA
GetEnvironmentStrings
GetTempFileNameA
GetFullPathNameA
GetCurrentDirectoryA
GetModuleHandleW
GetStockObject
DeleteObject
GetDeviceCaps
CreateFontIndirectW
GetSubMenu
GetParent
SetWindowTextW
GetDlgItem
LoadStringW
SetWindowLongW
EndDialog
ShowCursor
DeleteMenu
CharToOemA
CreateWindowExW
CharUpperBuffA
CharPrevA
CharNextA
DispatchMessageA
PeekMessageA
CharUpperA
MessageBoxA
GetActiveWindow
CharLowerA
CharToOemBuffA
OemToCharBuffA
SetDlgItemTextW
GetDesktopWindow
DialogBoxParamW
LoadMenuW
SendDlgItemMessageW
RemoveMenu
GetForegroundWindow
TrackPopupMenu
RegisterClassW
DefWindowProcW
CharNextW
GetWindowLongW
SystemParametersInfoW
GetWindowRect
SetForegroundWindow
GetDlgItemTextW
InsertMenuW
RegisterClipboardFormatW
LoadCursorW
SetCursor
SetMenuDefaultItem
DestroyMenu
GetAsyncKeyState
CheckDlgButton
SetFocus
EnableWindow
GetWindowTextW
PeekMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
MessageBoxW
ShowWindow
IsDlgButtonChecked
DestroyWindow
SendMessageW
PostMessageW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ord165
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderPathW
SHGetMalloc
SHGetFolderPathW
SHSetLocalizedName
ord155
ord28
ord256
SHGetFileInfoW
ShellExecuteExW
ord743
DragQueryFileW
ord190
SHFileOperationW
ord182
ord18
ord16
ord67
ord73
ord745
ord744
ShellExecuteW
ord17
SHGetDesktopFolder
ord25
SHChangeNotify
SHGetSpecialFolderLocation
CreateBindCtx
CoInitializeEx
CoUninitialize
CoCreateInstance
ReleaseStgMedium
OleGetClipboard
CoTaskMemFree
OleSetClipboard
VariantInit
VariantClear
SystemTimeToVariantTime
SysAllocString
SafeArrayCreateVector
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
PathCommonPrefixW
wnsprintfW
PathAppendW
StrCpyNW
PathFileExistsW
PathRemoveBlanksW
SHStrDupW
PathFindFileNameW
StrChrW
PathFindExtensionW
PathCompactPathW
StrStrW
PathCombineW
PathCanonicalizeW
PathIsRelativeW
PathIsPrefixW
PathRemoveFileSpecW
PathSkipRootW
PathStripToRootW
ord16
StrFormatKBSizeW
PathFindFileNameA
StrCmpNIW
ord215
ord217
ord219
ord346
ord199
ord456
ord485
ord354
ord107
PathRemoveBackslashW
PathCompactPathExW
StrCatBuffW
StrToIntW
StrRetToBufW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RegisterSendto
RouteTheCall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ