DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetClassInfoForCurrentUser
GetDefaultPartitionForCurrentUser
GetDefaultPartitionForSid
PartitionAccessCheck
Static task
static1
Behavioral task
behavioral1
Sample
f02efe92017ee2c2615f420c399f9d439633991aa0bb17d48b6e7fa660c0f2cb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f02efe92017ee2c2615f420c399f9d439633991aa0bb17d48b6e7fa660c0f2cb.dll
Resource
win10v2004-20220901-en
Target
f02efe92017ee2c2615f420c399f9d439633991aa0bb17d48b6e7fa660c0f2cb
Size
127KB
MD5
9055f6a06ea305555bff844bedf5f67a
SHA1
a3e13c4b7deeab5ab606cd8165a05dd6377371f4
SHA256
f02efe92017ee2c2615f420c399f9d439633991aa0bb17d48b6e7fa660c0f2cb
SHA512
81413adb8e9079c952f574d0a85c92fbad41014b331aa0f623ac2c7d56d17bb9940f38f72cd96a465c5c1ff197f9b1a20917b3238a0b26cb024cd8c0ce8a8b75
SSDEEP
3072:HhCejYP3/1PclKwRI9PLL3P0Jc+O5JOuXHV:HkoYvtg29P3/0JE8q
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetLengthSid
CopySid
IsValidSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
EqualSid
DeregisterEventSource
RegQueryValueExW
DuplicateToken
FreeSid
AllocateAndInitializeSid
RegNotifyChangeKeyValue
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegisterEventSourceW
ReportEventW
RegCloseKey
COMResModuleInstance
InitializeCriticalSection
TlsFree
TlsAlloc
GetModuleFileNameW
GetModuleHandleW
lstrlenW
lstrcatW
lstrcpyW
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
GetProcAddress
FreeLibrary
OutputDebugStringA
GetLastError
LoadLibraryW
WaitForSingleObject
CreateThread
CreateEventA
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
GetTickCount
InterlockedExchange
InterlockedCompareExchange
CloseHandle
TlsSetValue
TlsGetValue
lstrcmpiW
GetCurrentThread
DisableThreadLibraryCalls
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetVersionExA
GetSystemInfo
CreateSemaphoreA
Sleep
SetEvent
ReleaseSemaphore
lstrcpynW
FormatMessageW
LockResource
LoadResource
FindResourceW
ReleaseMutex
FindClose
DeleteFileW
SetFileAttributesW
FindNextFileW
FindFirstFileW
GetExitCodeProcess
CreateProcessW
ExpandEnvironmentStringsW
CreateDirectoryW
GetLocalTime
DebugBreak
GetThreadContext
IsDebuggerPresent
LoadLibraryA
CreateFileW
GetWindowsDirectoryW
CreateMutexW
WriteFile
SetFilePointer
LocalFree
lstrcatA
lstrcpyA
GetModuleFileNameA
VirtualQueryEx
DeleteCriticalSection
DelayLoadFailureHook
OpenMutexW
CompareFileTime
MapViewOfFile
OpenFileMappingW
GetCurrentProcess
LoadLibraryExW
wcscpy
sprintf
wcsrchr
_vsnwprintf
_waccess
_wstrtime
_wstrdate
__CxxFrameHandler
malloc
wcslen
_initterm
_adjust_fdiv
__dllonexit
_onexit
_CIfmod
_ftol
floor
_except_handler3
free
_purecall
rand
srand
time
wcscat
wcscmp
RtlInitializeCriticalSection
DbgPrint
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoGetObjectContext
RpcStringFreeW
UuidToStringW
RpcStringFreeA
UuidFromStringA
RpcRevertToSelf
RpcImpersonateClient
UuidToStringA
GetUserNameExW
LoadStringW
wsprintfW
CloseDesktop
GetThreadDesktop
SetThreadDesktop
OpenDesktopW
DialogBoxParamW
EndDialog
SetDlgItemTextW
CloseWindowStation
GetProcessWindowStation
OpenWindowStationW
SetProcessWindowStation
GetDesktopWindow
GetWindowRect
GetClientRect
wsprintfA
SetWindowPos
MapWindowPoints
VerQueryValueW
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetClassInfoForCurrentUser
GetDefaultPartitionForCurrentUser
GetDefaultPartitionForSid
PartitionAccessCheck
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ