DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ae156747870abb27aa529d42b5167825484ebde59aceb324c28a14055c2559fc.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae156747870abb27aa529d42b5167825484ebde59aceb324c28a14055c2559fc.dll
Resource
win10v2004-20221111-en
Target
ae156747870abb27aa529d42b5167825484ebde59aceb324c28a14055c2559fc
Size
224KB
MD5
f54ecebe7246a063dc3a551f471daa08
SHA1
5be9d46aa9d7e98917bc5caf10d8980b88f8b19a
SHA256
ae156747870abb27aa529d42b5167825484ebde59aceb324c28a14055c2559fc
SHA512
66b46c04fc55dac82e35af21de6fefa6d16f769b15a73e4ad9f590e512773cede8320b7475789c7ec4372b2f9f6b24e3756951129723585125f65d0bc2cec14a
SSDEEP
6144:IimsGrPLyNISpmX7m1cYFkyztWlwDPtIQ2Y:6bLyNarm/iedDFIH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
InterlockedIncrement
InterlockedDecrement
FreeLibrary
LoadLibraryExW
GetModuleHandleW
GetModuleFileNameW
lstrcpynA
lstrcpynW
lstrlenA
EnterCriticalSection
LeaveCriticalSection
SetThreadLocale
GetThreadLocale
CloseHandle
OpenProcess
LocalFree
LocalAlloc
GetCurrentProcess
GetUserDefaultLangID
SetLastError
GetUserDefaultUILanguage
GetModuleFileNameA
ExitProcess
GetWindowsDirectoryW
WideCharToMultiByte
FindResourceExW
FindClose
FindFirstFileW
Sleep
GetProcAddress
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
lstrcmpiW
FindResourceW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
VirtualAlloc
RaiseException
lstrlenW
MultiByteToWideChar
HeapCreate
GetModuleHandleA
WriteFile
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
LCMapStringA
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
VirtualFree
GetCommandLineA
GetCurrentThreadId
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RtlUnwind
GetStdHandle
EnableMenuItem
LoadBitmapW
InsertMenuW
FindWindowW
SendMessageW
CharNextW
SetMenuItemBitmaps
IsWindowVisible
GetActiveWindow
MessageBoxA
UnregisterClassA
DeleteObject
RegEnumKeyExW
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
SHGetSpecialFolderPathW
SHGetFolderPathW
DragQueryFileW
CoTaskMemRealloc
CoTaskMemFree
StringFromCLSID
StringFromGUID2
CoCreateInstance
ReleaseStgMedium
CoTaskMemAlloc
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
VarUI4FromStr
StrCmpW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ