DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ddb5279e759cf6a568df37a67219ce47b866a3f3e5db5ff435e599ab1b906c21.dll
Resource
win7-20220812-en
Target
ddb5279e759cf6a568df37a67219ce47b866a3f3e5db5ff435e599ab1b906c21
Size
160KB
MD5
a470519d9eb2a622832a463faf056f65
SHA1
6914a38d6c6034c14ea2000fb845692f37fac969
SHA256
ddb5279e759cf6a568df37a67219ce47b866a3f3e5db5ff435e599ab1b906c21
SHA512
3d43a070ff5f948b6f06b382b4f96310664ce2e89d53fb73ba316fce453ce06536023d1f5ccc6b5130f5214784d4e24636198af765f08643254a65ceebfc0593
SSDEEP
3072:+n7ZlhgZW464xBuDoZWuNHT6uXBgzUlPpyIJDW:0mf6i48Wu1T6yOI/DW
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
GetCurrentThreadId
GetCurrentProcessId
GetPrivateProfileIntA
GetPrivateProfileStringA
GetSystemDirectoryA
IsBadWritePtr
IsBadReadPtr
MoveFileA
DeleteFileA
CloseHandle
TerminateThread
GetLocalTime
SetFileAttributesA
CopyFileA
WriteFile
CreateFileA
GetVersion
CreateDirectoryA
GetFileAttributesA
GetShortPathNameA
FindFirstFileA
GetWindowsDirectoryA
Process32Next
TerminateProcess
GetExitCodeProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
SystemTimeToFileTime
FileTimeToSystemTime
GetUserDefaultLangID
GetTempPathA
GetPrivateProfileSectionNamesA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
SetFilePointer
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
lstrlenA
MultiByteToWideChar
lstrlenW
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
DisableThreadLibraryCalls
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindClose
GetCurrentDirectoryA
GetFullPathNameA
UnhandledExceptionFilter
ReadFile
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetCurrentProcess
GetOEMCP
GetACP
GetCPInfo
VirtualAlloc
ExitProcess
VirtualFree
HeapCreate
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetCommandLineA
GetDriveTypeA
FileTimeToLocalFileTime
ExitThread
TlsSetValue
CreateThread
RaiseException
GetSystemTime
GetTimeZoneInformation
RtlUnwind
HeapFree
HeapAlloc
HeapReAlloc
SetEnvironmentVariableA
GetWindowTextA
GetParent
SetWindowTextA
CharNextA
SetWindowsHookExA
MessageBoxA
LoadCursorA
UnhookWindowsHookEx
GetClassNameA
CallNextHookEx
GetFocus
SetFocus
SetForegroundWindow
wsprintfA
FindWindowExA
LoadStringA
RegSetValueExA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
ShellExecuteA
SHGetSpecialFolderPathA
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
LoadRegTypeLi
SysStringLen
SysAllocStringLen
VariantClear
VariantChangeType
VarUI4FromStr
SysFreeString
SysAllocString
LoadTypeLi
VariantCopy
RegisterTypeLi
InternetOpenA
InternetOpenUrlA
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
InternetSetCookieA
DeleteUrlCacheEntry
GetAdaptersInfo
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ