DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
369852c6dc4d2ca2763772a5c0f013ac08d921a04da84731ca778f8f3e72c8a1.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
369852c6dc4d2ca2763772a5c0f013ac08d921a04da84731ca778f8f3e72c8a1.dll
Resource
win10v2004-20220812-en
Target
369852c6dc4d2ca2763772a5c0f013ac08d921a04da84731ca778f8f3e72c8a1
Size
64KB
MD5
387ab6f52b595dafeacc8b817a96b19a
SHA1
4bfe25a4d12427fd5ae79c13f312864425193196
SHA256
369852c6dc4d2ca2763772a5c0f013ac08d921a04da84731ca778f8f3e72c8a1
SHA512
e26a008dcc545c4dad17fd28d28e14fd1d269bebb0963682b34fc15cc0439b93484bf6e5d855a6e81c79b4fdef8886342f30782ccc64cd3b4434d86d4f3a550a
SSDEEP
768:W9QnJVDuVYpkMZaEqonz7tHX/fX9dENe10lPsTdEglDHbfqU9ZlWveqhC/xma:UQnJoVYbPXNCsTu4zLZloSN
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetCrackUrlA
InternetCloseHandle
SetupIterateCabinetA
lstrlenW
MultiByteToWideChar
GetShortPathNameA
GetModuleHandleA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
GetCurrentThreadId
FlushInstructionCache
InterlockedDecrement
GetTickCount
CreateThread
MulDiv
DeleteFileA
FindClose
FindFirstFileA
GetTempPathA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
WaitForSingleObject
RemoveDirectoryA
SetLastError
WritePrivateProfileStringA
GetLocalTime
ReleaseSemaphore
OpenSemaphoreA
SetEvent
OpenEventA
CreateProcessA
GetFileAttributesA
FindNextFileA
GetWindowsDirectoryA
MoveFileExA
DebugBreak
HeapReAlloc
HeapFree
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
GetModuleFileNameA
DisableThreadLibraryCalls
lstrlenA
lstrcpynA
CreateFileA
GetLastError
WriteFile
Sleep
CloseHandle
GetStringTypeA
GetStringTypeW
GetCurrentProcess
RtlUnwind
SetWindowRgn
SetWindowPos
DestroyWindow
GetParent
SetFocus
GetFocus
IsChild
GetClassInfoExA
LoadCursorA
CharNextA
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
ShowWindow
GetKeyState
DefWindowProcA
wsprintfA
PostMessageA
wvsprintfA
GetSysColor
InflateRect
BeginPaint
GetClientRect
EndPaint
GetDC
ReleaseDC
InvalidateRect
IntersectRect
IsWindow
EqualRect
RegisterClassExA
OffsetRect
ord250
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
OleRegEnumVerbs
OleRegGetUserType
OleRegGetMiscStatus
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CreateOleAdviseHolder
SysAllocStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
VariantClear
SysFreeString
SysAllocString
SysStringLen
SetPixel
DeleteDC
RestoreDC
GetTextExtentPoint32A
ExtTextOutA
SetTextAlign
SetTextColor
SetBkColor
SelectObject
GetStockObject
EnumFontFamiliesExA
CreateFontIndirectA
DeleteObject
CreateDCA
GetDeviceCaps
LPtoDP
SaveDC
SetMapMode
SetWindowOrgEx
CreateRectRgnIndirect
SetViewportOrgEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ