DispatchMemory
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IAlloc
Static task
static1
Behavioral task
behavioral1
Sample
bf6fc9d6873dab352ffab32a434b5b86fe3a7968cfaa6c9cc817727baec8b495.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf6fc9d6873dab352ffab32a434b5b86fe3a7968cfaa6c9cc817727baec8b495.dll
Resource
win10v2004-20221111-en
Target
bf6fc9d6873dab352ffab32a434b5b86fe3a7968cfaa6c9cc817727baec8b495
Size
1.0MB
MD5
27916fc3240cf5a573b1d55b05ec6412
SHA1
c791cfb14a125f18c69fc1f9820669f9ebec4ced
SHA256
bf6fc9d6873dab352ffab32a434b5b86fe3a7968cfaa6c9cc817727baec8b495
SHA512
b4c0ad5e045c9de873f9533d93bb167d7e39dd5279e986eb602af3cd58f1e3010645c29fa286abc17fcb3aeafbfa7c5afc8e00c75cfbcfa7d2cc3666ce4d5675
SSDEEP
24576:/25OXSDcrD7vUrI2t7TCP51Kb+kVLTdguzU:/25oSqUByR1KpVLTyu
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
NdrClientCall2
RpcBindingFromStringBindingA
RpcStringBindingComposeA
RpcBindingFree
RpcStringFreeA
RemoveDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
FindClose
FindNextFileA
FindFirstFileA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetACP
OpenProcess
GetSystemTime
OpenSemaphoreA
DuplicateHandle
GetCurrentProcess
HeapAlloc
HeapFree
HeapCreate
HeapDestroy
GetTimeZoneInformation
LocalFree
GetVersionExA
GetVolumeInformationA
TerminateProcess
FlushFileBuffers
TerminateThread
LockResource
LoadResource
SizeofResource
FindResourceA
GetWindowsDirectoryA
GetPrivateProfileStructA
GetPrivateProfileIntA
WritePrivateProfileStringA
WritePrivateProfileStructA
GetDriveTypeA
ExpandEnvironmentStringsA
SetLastError
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
GetThreadPriority
SetFileAttributesA
GetProcessHeap
GetFullPathNameA
GetComputerNameW
GetShortPathNameA
GetLocaleInfoA
ReleaseMutex
GetSystemInfo
FileTimeToDosDateTime
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
GetStartupInfoA
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
HeapSize
HeapReAlloc
VirtualAlloc
VirtualFree
LCMapStringW
LCMapStringA
ExitProcess
GetStdHandle
IsValidCodePage
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetDateFormatA
GetTimeFormatA
CreateThread
ExitThread
RtlUnwind
GetSystemTimeAsFileTime
CreateMutexA
OpenMutexA
GetLocalTime
GetVersion
DeviceIoControl
lstrlenA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
WideCharToMultiByte
InterlockedDecrement
GetCurrentProcessId
DisableThreadLibraryCalls
CreateSemaphoreA
GetModuleHandleA
GetModuleFileNameA
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
GetSystemDirectoryA
GetFileTime
SetFileTime
CreateDirectoryA
MoveFileA
CopyFileA
GetComputerNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
ResumeThread
InterlockedIncrement
GetCurrentThreadId
GetDiskFreeSpaceA
FreeLibrary
LoadLibraryA
GetProcAddress
GetLastError
FormatMessageA
CreateEventA
ResetEvent
WaitForSingleObject
SetEvent
GetTickCount
MultiByteToWideChar
WriteFile
CompareStringW
SetEnvironmentVariableA
Sleep
SetFilePointer
VirtualProtect
DeleteFileA
DeleteCriticalSection
GetTempPathA
CreateFileA
GetFileSize
ReadFile
CloseHandle
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
MoveWindow
GetParent
SetWindowPos
GetWindowRect
GetSystemMetrics
LoadKeyboardLayoutA
ActivateKeyboardLayout
UnloadKeyboardLayout
CharLowerA
ExitWindowsEx
GetDesktopWindow
GetKeyNameTextA
GetAsyncKeyState
GetKeyboardLayout
ToAsciiEx
GetDC
ReleaseDC
EnumDisplaySettingsA
MessageBoxA
SetWindowsHookExA
BeginPaint
EndPaint
LoadIconA
LoadCursorA
SetTimer
GetProcessWindowStation
GetUserObjectInformationA
GetForegroundWindow
GetKeyState
GetKeyboardLayoutNameA
CallNextHookEx
UnregisterHotKey
RegisterHotKey
LoadStringA
GetWindowThreadProcessId
SendMessageA
SetDlgItemTextA
KillTimer
UnregisterClassA
RegisterClassA
CreateWindowExA
GetWindowLongA
DefWindowProcA
SetWindowLongA
GetCursorPos
wsprintfW
PostMessageA
ShowWindow
DialogBoxParamA
GetPropA
RemovePropA
SetPropA
DestroyWindow
GetMessageA
IsWindow
TranslateMessage
DispatchMessageA
SetForegroundWindow
EndDialog
wsprintfA
MapVirtualKeyExA
MapVirtualKeyA
GetActiveWindow
UnhookWindowsHookEx
DeleteDC
DeleteObject
StretchBlt
CreateDIBSection
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
GetStockObject
CloseServiceHandle
InitiateSystemShutdownA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegSetKeySecurity
RegGetKeySecurity
GetTokenInformation
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
DeleteService
OpenServiceA
OpenSCManagerA
RevertToSelf
ImpersonateLoggedOnUser
DuplicateToken
LogonUserA
ShellExecuteA
SHLoadInProc
CoTaskMemFree
StringFromCLSID
CoCreateInstance
CoInitialize
CoUninitialize
CoCreateGuid
SysFreeString
SysStringLen
SysAllocString
VariantClear
VariantInit
SysAllocStringLen
DispatchMemory
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ