DllInit
DllInstall
Static task
static1
Behavioral task
behavioral1
Sample
aee76aac80b220be092bf51569e970099dc3a114af6cdffea71118d1fe39bc17.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aee76aac80b220be092bf51569e970099dc3a114af6cdffea71118d1fe39bc17.dll
Resource
win10v2004-20220812-en
Target
aee76aac80b220be092bf51569e970099dc3a114af6cdffea71118d1fe39bc17
Size
80KB
MD5
8a4a6a06fa3077dd8d6176003a09b796
SHA1
319b0c38cbaa8f46d413e2cbc543f07b80793edb
SHA256
aee76aac80b220be092bf51569e970099dc3a114af6cdffea71118d1fe39bc17
SHA512
1a3fd92b155827d61a0671c1630d4b539253885e328d7381d2fee5023b7f9cfd6ee61b7b79ceff6ca5c2aac46361ce427354dceb8f64c5caa26f4d3a7c899f4c
SSDEEP
1536:HCIVwg7Ob3Of4mgDvjAePRdn22QHB7lHxt8DiX21SAVQY8rPsKrG:ihvj7PSfHz2ichJ2G
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcessHeap
LoadLibraryA
CreateDirectoryA
GetModuleFileNameA
GetModuleHandleA
CreateThread
MoveFileExA
lstrlenW
CopyFileA
HeapValidate
GetComputerNameA
WaitForSingleObject
HeapAlloc
CloseHandle
InterlockedExchange
VirtualQuery
LeaveCriticalSection
UnmapViewOfFile
GetProcAddress
InitializeCriticalSection
HeapFree
CreateFileMappingA
GetLastError
FindNextFileW
GlobalReAlloc
SetComputerNameExW
OpenThread
lstrcpynW
GetComputerNameW
FindResourceExA
SetFilePointer
GlobalDeleteAtom
SetProcessWorkingSetSize
UnlockFile
ReadConsoleInputA
FreeResource
FindClose
OpenFile
HeapSetInformation
WriteFileEx
GetNumberFormatA
HeapLock
SetConsoleTitleA
SearchPathW
CreateToolhelp32Snapshot
WriteProcessMemory
CreateIoCompletionPort
GetTimeZoneInformation
WaitForMultipleObjectsEx
GetVolumePathNameW
GetUserDefaultUILanguage
LockResource
SetConsoleTextAttribute
GetProfileIntW
LocalUnlock
GetProfileIntA
WriteConsoleInputA
IsBadCodePtr
GetCurrentDirectoryA
OpenEventW
GetThreadLocale
GetFileTime
FindNextVolumeMountPointW
GetExitCodeThread
CreateFileW
IsBadStringPtrA
SetNamedPipeHandleState
FindAtomA
Sleep
SwitchToThread
SetFileApisToOEM
WriteProfileStringW
SetStdHandle
GetCPInfo
LocalHandle
GetVolumeNameForVolumeMountPointW
ExpandEnvironmentStringsW
ReplaceFileW
GetModuleHandleW
LocalFileTimeToFileTime
GetEnvironmentVariableA
GetThreadPriority
EnumUILanguagesW
GetFileAttributesExW
GetLocaleInfoW
CreateConsoleScreenBuffer
GlobalAddAtomA
GetBinaryTypeA
GlobalFindAtomW
CopyFileW
OpenMutexW
CreateFileMappingW
ExpandEnvironmentStringsA
LocalAlloc
FlushConsoleInputBuffer
MapViewOfFileEx
GetTapeParameters
FormatMessageW
CreateNamedPipeW
IsValidLocale
IsValidLanguageGroup
LCMapStringA
AreFileApisANSI
ChangeTimerQueueTimer
lstrcpyA
GetAtomNameW
FindAtomW
GetProfileStringA
GetWindowsDirectoryA
HeapUnlock
GetFileType
GlobalFree
SetConsoleMode
GetProcessVersion
ConnectNamedPipe
lstrcpynA
EnumSystemLocalesA
GetLogicalDriveStringsW
SetEvent
GetFileSize
GetDateFormatW
GetUserDefaultLangID
GlobalAlloc
ReadConsoleInputW
WaitNamedPipeW
VerifyVersionInfoA
FindNextVolumeW
ResetEvent
GetStringTypeA
UnlockFileEx
GlobalMemoryStatus
CreateMailslotW
GetSystemDirectoryW
CallNamedPipeA
OpenFileMappingW
GetFileAttributesExA
TerminateProcess
SearchPathA
SetDefaultCommConfigW
GetSystemInfo
GetThreadTimes
CreateMailslotA
SetEndOfFile
lstrcmpiW
ProcessIdToSessionId
CreateTimerQueueTimer
CoTaskMemAlloc
CoInitialize
OleCreateLinkToFile
OleDuplicateData
OleRegGetMiscStatus
CreateAntiMoniker
OleCreateFromFile
CoGetMalloc
GetHGlobalFromStream
CoFileTimeNow
CoDisconnectObject
CreateDataCache
CoDisableCallCancellation
CreateDataAdviseHolder
CreateFileMoniker
CoEnableCallCancellation
OleCreateMenuDescriptor
CoGetCallContext
OleLoadFromStream
CreatePointerMoniker
CoGetMarshalSizeMax
StgIsStorageILockBytes
CoRegisterMessageFilter
PropVariantClear
StgCreateDocfile
RegisterDragDrop
OleSetMenuDescriptor
OleLockRunning
DllInit
DllInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ