DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IAlloc
QueueMemory
Static task
static1
Behavioral task
behavioral1
Sample
c5cd4060b23694042fcf8dd56c71f433506bb2cc72ee11da5c1d0fd7ec67a7b4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c5cd4060b23694042fcf8dd56c71f433506bb2cc72ee11da5c1d0fd7ec67a7b4.dll
Resource
win10v2004-20221111-en
Target
c5cd4060b23694042fcf8dd56c71f433506bb2cc72ee11da5c1d0fd7ec67a7b4
Size
900KB
MD5
1fbeb78a70c4e96c308e87f35fab2f60
SHA1
6a2ca75db4015abfc9b7a8bc3fdb7d35405ad694
SHA256
c5cd4060b23694042fcf8dd56c71f433506bb2cc72ee11da5c1d0fd7ec67a7b4
SHA512
2229672c976b2c9e4ccf3c5a870f5da79f9d033582a8e8b8244b55b100f9ee2ad4a9608c02f06c7e716251afecc581a6f9e7ca5928babed5ebd6073beae8d945
SSDEEP
12288:mQ3f79us/BejcC7yzIYaS7bJdQL6RNnmpSQYsNdTQoEjDENu8W3/:33D9us/B3NRdQ6RNnmpSQYsjTdeF8W3
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
NdrClientCall2
RpcBindingFree
RpcStringBindingComposeA
RpcBindingFromStringBindingA
RpcStringFreeA
HeapCreate
HeapDestroy
GetCurrentProcess
GetLocalTime
GetTimeZoneInformation
GetComputerNameA
GetACP
LocalFree
OpenProcess
GetVersionExA
GetVolumeInformationA
TerminateProcess
GetCurrentThread
CreateMutexA
ReleaseMutex
FlushFileBuffers
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenSemaphoreA
GetDriveTypeA
ExpandEnvironmentStringsA
OpenMutexA
RemoveDirectoryA
FileTimeToSystemTime
CreateDirectoryA
GetWindowsDirectoryA
GetProcessHeap
GetFullPathNameA
GetComputerNameW
GetShortPathNameA
GetNumberFormatA
GetLocaleInfoA
HeapFree
GetStartupInfoA
SetHandleCount
GetStringTypeW
GetStringTypeA
HeapSize
HeapReAlloc
VirtualAlloc
VirtualFree
LCMapStringW
LCMapStringA
ExitProcess
GetStdHandle
IsValidCodePage
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetDateFormatA
GetTimeFormatA
RaiseException
FileTimeToLocalFileTime
CreateThread
ExitThread
RtlUnwind
GetSystemTimeAsFileTime
HeapAlloc
OpenFileMappingA
lstrlenA
WideCharToMultiByte
InterlockedDecrement
DeviceIoControl
DisableThreadLibraryCalls
GetCurrentProcessId
SetLastError
ResetEvent
GetModuleHandleA
SetThreadPriority
TerminateThread
GetConsoleMode
GetFileTime
SetFileTime
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetFileAttributesA
SetFileAttributesA
FindNextFileA
FindClose
InitializeCriticalSection
CreateEventA
ResumeThread
SetEvent
InterlockedIncrement
GetCurrentThreadId
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
DeleteCriticalSection
GetDiskFreeSpaceA
FreeLibrary
LoadLibraryA
GetProcAddress
GetLastError
FormatMessageA
DeleteFileA
MoveFileA
GetVersion
GetSystemDirectoryA
GetTickCount
MultiByteToWideChar
WriteFile
CreateFileA
Sleep
ReadFile
SetFilePointer
CloseHandle
VirtualProtect
GetModuleFileNameA
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
WriteConsoleW
CompareStringA
CompareStringW
SetEnvironmentVariableA
UnregisterHotKey
RegisterHotKey
LoadIconA
LoadCursorA
ToAsciiEx
GetKeyboardLayout
CreatePopupMenu
TrackPopupMenu
DestroyMenu
LoadImageA
SetTimer
EnumWindows
GetKeyNameTextA
GetKeyState
GetAsyncKeyState
GetKeyboardLayoutNameA
EnumDisplaySettingsA
FindWindowA
GetWindowThreadProcessId
OpenDesktopA
OpenInputDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
CallNextHookEx
PostQuitMessage
UnhookWindowsHookEx
SetWindowsHookExA
GetSystemMetrics
GetUserObjectInformationA
SetThreadDesktop
SetProcessWindowStation
CloseDesktop
CloseWindowStation
MessageBoxA
ExitWindowsEx
LoadStringA
SendMessageA
DialogBoxParamA
SetWindowTextA
SetDlgItemTextA
SetPropA
SetForegroundWindow
EndDialog
PostThreadMessageA
GetClassNameA
GetWindowRect
GetDC
ReleaseDC
GetMessageA
TranslateMessage
DispatchMessageA
KillTimer
DestroyWindow
UnregisterClassA
RegisterClassA
CreateWindowExA
GetWindowLongA
DefWindowProcA
IsWindow
SetWindowLongA
GetCursorPos
PostMessageA
wsprintfA
wsprintfW
GetForegroundWindow
MapVirtualKeyExA
MapVirtualKeyA
AppendMenuA
GetDeviceCaps
DeleteObject
DeleteDC
CreateDIBSection
CreateCompatibleDC
GdiFlush
BitBlt
SelectObject
CreateCompatibleBitmap
CreateDCA
GetStockObject
RegQueryValueExA
InitiateSystemShutdownA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
LogonUserA
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetKeySecurity
RegOpenKeyExA
RegGetKeySecurity
RevertToSelf
GetSidLengthRequired
LookupAccountSidA
ImpersonateLoggedOnUser
DuplicateToken
GetTokenInformation
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
Shell_NotifyIconA
SHLoadInProc
StringFromCLSID
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemFree
VARIANT_UserSize
SafeArrayLock
SafeArrayCreate
VariantInit
VariantClear
SysAllocStringLen
SysAllocString
SysStringLen
SysFreeString
SafeArrayUnlock
VARIANT_UserMarshal
VARIANT_UserUnmarshal
VARIANT_UserFree
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IAlloc
QueueMemory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ