DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
82a5483430b69274ab60aecca928e934b1d24a131d6436b2142d996f1d37db37.dll
Resource
win7-20221111-en
Target
82a5483430b69274ab60aecca928e934b1d24a131d6436b2142d996f1d37db37
Size
532KB
MD5
68423c11e8889d9518d73dbe6742c7b3
SHA1
aab75c6f8bbf77945aa5ece1972c3c6cf3e41d2b
SHA256
82a5483430b69274ab60aecca928e934b1d24a131d6436b2142d996f1d37db37
SHA512
ee85ff16540886a7481ff97dff3025a1ad1bf31d28a892facc26c6281a5a6950547f242c1ede42179dd26e42fe03ce25d6856915befe59fd52cfe76dd92bddfe
SSDEEP
12288:UqR8068GPvPgvIf5SyluARF16b1ZLmSfR1fUHQ7:E/oy8AVAZLmkvI
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ResetEvent
CreateThread
OpenEventW
SetEvent
TerminateThread
ReleaseMutex
CloseHandle
CreateEventW
WaitForSingleObject
WideCharToMultiByte
GetLastError
lstrlenA
OutputDebugStringW
DebugBreak
InterlockedIncrement
InterlockedDecrement
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiW
GetModuleFileNameW
DisableThreadLibraryCalls
FreeLibrary
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
Sleep
CreateProcessW
CreateMutexW
DeviceIoControl
OpenFile
IsBadReadPtr
RemoveDirectoryW
OutputDebugStringA
FormatMessageW
GetSystemInfo
GetTempPathW
LoadLibraryW
GetVersionExW
GetFileAttributesW
GetVersion
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
CreateFileW
CreateFileA
GetDateFormatW
GetLocalTime
GlobalAlloc
CreateDirectoryW
GlobalFree
CopyFileW
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
HeapFree
GetProcessHeap
HeapAlloc
GetProcAddress
LoadLibraryA
VirtualFree
VirtualAlloc
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapReAlloc
GetCurrentThreadId
GetCommandLineA
LCMapStringA
LCMapStringW
GetCPInfo
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetOEMCP
IsValidCodePage
HeapDestroy
HeapCreate
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
GetModuleFileNameA
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoW
MultiByteToWideChar
GetSystemMetrics
UnregisterClassA
ShowWindow
DefWindowProcW
GetFocus
CreateWindowExW
GetClientRect
RegisterClassW
LoadStringW
wvsprintfW
LoadCursorW
CharNextW
DestroyWindow
IsWindow
GetClassInfoW
SetWindowLongW
GetWindowLongW
GetWindow
SetWindowPos
CallWindowProcW
CreateSolidBrush
CryptGetKeyParam
GetUserNameW
CryptCreateHash
CryptAcquireContextW
CryptGetHashParam
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExW
RegQueryValueExW
RegEnumValueW
RegCloseKey
CryptHashData
CryptDestroyHash
OpenProcessToken
GetTokenInformation
CryptDeriveKey
CryptDecrypt
CryptReleaseContext
CryptDestroyKey
CryptEncrypt
SHGetFolderPathW
ShellExecuteW
OleRun
CoUninitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoInitialize
GetErrorInfo
VariantChangeType
SysFreeString
SysAllocString
VariantInit
VariantClear
SysStringLen
LoadTypeLi
DispCallFunc
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
PathRemoveFileSpecW
UrlGetPartW
PathFileExistsW
InternetCrackUrlW
InternetConnectW
HttpSendRequestW
HttpQueryInfoW
DeleteUrlCacheEntryW
InternetOpenW
InternetOpenUrlW
InternetCloseHandle
HttpOpenRequestW
InternetReadFile
URLDownloadToFileW
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
GetAdaptersInfo
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE