DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Rundll32_
Static task
static1
Behavioral task
behavioral1
Sample
5163c71e9982ab61a58c87d648766c8788a1cf713f763cdce038fa1bea8a2b49.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5163c71e9982ab61a58c87d648766c8788a1cf713f763cdce038fa1bea8a2b49.dll
Resource
win10v2004-20220812-en
Target
5163c71e9982ab61a58c87d648766c8788a1cf713f763cdce038fa1bea8a2b49
Size
131KB
MD5
10ceb5724a18a6ac7c0633e7a7491311
SHA1
072f6190b56c4e4f95eb9ace0b73c0c8b43c0f1e
SHA256
5163c71e9982ab61a58c87d648766c8788a1cf713f763cdce038fa1bea8a2b49
SHA512
03ef13fc56abd0e8367555c99fc8afa713df5e5f3cddea31d73a5cf6682af54f5a0346242a8cc558705e40d2e872e575a714f8e2c3a12542f5895817535b73f9
SSDEEP
3072:FH1Tb0aR4LR9Rpgg9TrwSZXwc5QWU+rYmsAT:FHtNRmZpFTrwSZXwc5IfXK
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
TlsGetValue
SystemTimeToFileTime
GetSystemTime
lstrlenA
IsBadWritePtr
TlsAlloc
TlsFree
TlsSetValue
GetLastError
CreateMutexA
GetModuleFileNameW
lstrcpynA
GetVersionExA
LoadLibraryA
MapViewOfFile
CreateFileMappingA
WideCharToMultiByte
UnmapViewOfFile
LeaveCriticalSection
EnterCriticalSection
ReadFile
GetFileSize
CreateFileA
GetShortPathNameA
GetLongPathNameA
GetWindowsDirectoryA
OpenMutexA
lstrcmpA
GetCommandLineA
CreateProcessA
CopyFileA
lstrcatA
lstrcpyA
MultiByteToWideChar
OpenProcess
lstrlenW
VirtualAllocEx
CreateRemoteThread
GetExitCodeThread
VirtualFreeEx
DeleteCriticalSection
InitializeCriticalSection
WaitForMultipleObjects
SetEvent
CreateEventA
CreateThread
WaitForSingleObject
TerminateThread
CreateToolhelp32Snapshot
GetModuleFileNameA
GetSystemDirectoryA
LoadLibraryExA
ReadProcessMemory
FreeLibrary
VirtualQuery
lstrcmpiA
VirtualProtect
Sleep
SetLastError
GetVersion
WriteProcessMemory
GetCurrentProcessId
Module32First
Module32Next
CloseHandle
GetModuleHandleA
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
GetProcAddress
OpenFileMappingA
WritePrivateProfileSectionA
MoveFileExA
WriteFile
GetPrivateProfileStructA
GetTempPathA
GetPrivateProfileIntA
WritePrivateProfileStructA
FindFirstFileA
FindNextFileA
FindClose
DeviceIoControl
GetTickCount
InterlockedDecrement
GetACP
Process32Next
Process32First
LoadLibraryW
IsDebuggerPresent
DeleteFileA
RegisterWindowMessageA
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowA
PostMessageA
DefWindowProcA
GetWindowLongA
wsprintfA
FindWindowExA
GetClassNameA
SetWindowLongA
IsWindow
CreateWindowExA
GetWindowThreadProcessId
SetWindowsHookExA
SetWindowsHookExW
SetTimer
EnumWindows
SendMessageA
GetParent
GetWindowTextA
CallNextHookEx
UnhookWindowsHookEx
KillTimer
DestroyWindow
PostQuitMessage
GetClassInfoExA
RegisterClassExA
GetStockObject
RegOpenKeyExA
RegDeleteValueA
RegOpenKeyA
RegEnumKeyExA
RegEnumKeyA
RegEnumValueA
RegCloseKey
RegNotifyChangeKeyValue
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
DeleteService
OpenServiceA
QueryServiceStatus
StartServiceA
ControlService
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
CoTaskMemFree
StringFromCLSID
SysFreeString
SysAllocString
PathRemoveBlanksA
PathAppendA
PathFileExistsA
StrStrIA
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
PathRemoveBackslashA
PathRemoveFileSpecA
PathRemoveExtensionA
SHGetValueA
ImageDirectoryEntryToData
_mbsicmp
rand
wcscpy
sprintf
_mbsnbicmp
_mbschr
srand
time
_mbscmp
_mbsnbcpy
_snprintf
rename
sscanf
_tempnam
wcslen
_wcsicmp
tmpnam
fclose
fseek
fputs
strstr
fgets
rewind
fopen
fwrite
strrchr
strchr
fread
ftell
malloc
_strnicmp
strncpy
_stricmp
_except_handler3
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
memmove
realloc
free
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
_itoa
_strlwr
_CxxThrowException
_wcsnicmp
WSACleanup
gethostbyname
gethostname
WSAStartup
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Rundll32_
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ