CreateProcessNotify
cmdlrsm
Static task
static1
Behavioral task
behavioral1
Sample
e76ef992a01fac1d0ef108676d7385b60a3654cc14b38078c11d86dcb956a8b8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e76ef992a01fac1d0ef108676d7385b60a3654cc14b38078c11d86dcb956a8b8.dll
Resource
win10v2004-20220812-en
Target
e76ef992a01fac1d0ef108676d7385b60a3654cc14b38078c11d86dcb956a8b8
Size
57KB
MD5
4e26d6cbf8932dbe58a1f73c6b70cb5f
SHA1
e1165bbbe5f141c95e77767fc34b4cecb4b35c12
SHA256
e76ef992a01fac1d0ef108676d7385b60a3654cc14b38078c11d86dcb956a8b8
SHA512
41329fb06702e9d9b689c8689f45e1fa4487cbf6df7d1043217b371fdb914c39ce9c71b90815a46b5afa25d8962e1d313063ad618329b9338fd73ecd5dd39374
SSDEEP
768:6mQfo+0Z84WfRhM7taqgyChv6eHVn6y/C4aJBhzMIXxrSjuBPvdufWDC+y0DQFYw:6mQ3cWjytazvT1rQyIBHKuDtfYXvV0i
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ILSaveToStream
DllUnregisterServer
ImmGetHotKey
PathYetAnotherMakeUniqueName
SdbGetEntryFlags
FindExecutableA
ImmSetConversionStatus
PrintersGetCommand_RunDLL
ImmUnlockClientImc
ImmDestroySoftKeyboard
ImmIMPSetIMEA
SdbFreeFlagInfo
DllGetVersion
CtfImmLastEnabledWndDestroy
ImmSetCompositionStringA
SdbRegisterDatabase
ImmCreateSoftKeyboard
ReadCabinetState
CtfAImmActivate
SdbFindNextMsiPackage
ImmDisableIme
SdbCloseApphelpInformation
SdbQueryDataEx
SdbRegisterDatabaseEx
ILCreateFromPathA
DoEnvironmentSubstA
SdbSetPermLayerKeys
GetFileNameFromBrowse
RegenerateUserEnvironment
ImmSetCompositionWindow
ImmWINNLSGetEnableStatus
DllCanUnloadNow
OpenAs_RunDLL
ImmWINNLSGetIMEHotkey
DragFinish
ImmGetContext
ImmGetRegisterWordStyleA
CheckEscapesA
ILRemoveLastID
Control_RunDLLA
DragQueryPoint
PifMgr_GetProperties
Control_RunDLL
ImmGetAppCompatFlags
Activate_RunDLL
GetTokenInformation
AllocateAndInitializeSid
QueryServiceStatus
SHGetMalloc
FindVolumeMountPointClose
GetLastError
ReleaseSemaphore
CreateThread
UnmapViewOfFile
VirtualQuery
GetTapeStatus
WriteTapemark
SetErrorMode
WaitForSingleObject
WaitForMultipleObjects
LoadResource
GetModuleHandleA
SetTapeParameters
EraseTape
PrepareTape
MapViewOfFile
WriteFile
GetFileInformationByHandle
GetCurrentProcessId
GlobalAlloc
CreateFileMappingA
GetCurrentProcess
UnhookWindowsHookEx
InvalidateRect
GetWindow
DestroyWindow
GetDlgItem
CallNextHookEx
SetParent
MonitorFromWindow
UpdateWindow
CoUninitialize
CLSIDFromString
StringFromGUID2
NtQueryQuotaInformationFile
NetApiBufferSize
CreateProcessNotify
cmdlrsm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ