CloseExistedDll
CloseExistedDllByRundll32
CreateTask
Seek
SendStatisticDataOnInstall
UpdateIFEOInfo
fnClose
fnOpen
Static task
static1
Behavioral task
behavioral1
Sample
a97c4b15838bf848f8f4ce2352f6cffdad03a9be5eab81d11d9d5512fa26a66c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a97c4b15838bf848f8f4ce2352f6cffdad03a9be5eab81d11d9d5512fa26a66c.dll
Resource
win10v2004-20220812-en
Target
a97c4b15838bf848f8f4ce2352f6cffdad03a9be5eab81d11d9d5512fa26a66c
Size
408KB
MD5
dc68d243b622ee9a63df8bcdfa1f5ff0
SHA1
8c50900cf304d2960bfb634fe9820b829bdc60cc
SHA256
a97c4b15838bf848f8f4ce2352f6cffdad03a9be5eab81d11d9d5512fa26a66c
SHA512
8d2f55abde3be7cf65939e0887a7e8e24cc6bdc22a62ab0ce28cdcc23fd3ac2a048cdbb837653cd2ce2540ff3820cbb6a247d526834d3223d52474d306e9e838
SSDEEP
6144:Tx0lURCR2+0/UlAjg+6BEzYwsFg4fJAC/gYWXkif8PprRT:Tx0WER2+0tjg+ogUJHg2Cul
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetAdaptersInfo
InterlockedIncrement
GetWindowsDirectoryW
FindFirstFileW
InterlockedDecrement
GetModuleFileNameW
GetLastError
GetVersion
DeleteCriticalSection
FindResourceW
Sleep
GetPrivateProfileIntW
GetPrivateProfileStringW
GetTempPathW
GetTempFileNameW
CreateProcessW
SetLastError
CreateMutexW
WriteProcessMemory
GetCurrentProcess
GlobalAlloc
lstrlenW
GetTickCount
GetModuleHandleW
GetShortPathNameA
GlobalUnlock
FlushInstructionCache
MulDiv
EnterCriticalSection
LeaveCriticalSection
lstrcmpW
GlobalLock
WideCharToMultiByte
CreateFileW
DeviceIoControl
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
ResumeThread
GetThreadContext
SetThreadContext
SuspendThread
CompareStringA
ReadFile
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
MultiByteToWideChar
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetModuleFileNameA
GetStdHandle
WriteFile
HeapCreate
ExitProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
IsValidCodePage
GetOEMCP
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCommandLineA
GetSystemTimeAsFileTime
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
FindClose
FindNextFileW
DeleteFileW
WaitForSingleObject
CloseHandle
CreateThread
CreateEventW
GetCurrentProcessId
RaiseException
InitializeCriticalSection
FindResourceExW
SetEvent
LoadResource
LockResource
SizeofResource
GlobalFree
SetEnvironmentVariableA
lstrcpyW
GetCurrentThreadId
FreeLibrary
GetCurrentThread
GetProcAddress
LoadLibraryW
CompareStringW
FindWindowW
SetWindowsHookExW
UnhookWindowsHookEx
SendMessageW
PostThreadMessageW
RegisterWindowMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
ShowWindow
CreateDialogParamW
DefWindowProcW
GetWindowThreadProcessId
DestroyAcceleratorTable
CharNextW
ReleaseDC
ReleaseCapture
GetSysColor
SetCapture
GetDC
CreateWindowExW
FillRect
CallWindowProcW
MoveWindow
GetWindowTextLengthW
GetDlgItem
GetWindowTextW
InvalidateRect
RegisterClassExW
CallNextHookEx
KillTimer
SetTimer
GetDesktopWindow
UnregisterClassA
GetClientRect
GetWindowRect
SetWindowPos
SetWindowTextW
GetWindowLongW
SetWindowLongW
SetWindowPlacement
BeginPaint
EndPaint
DestroyWindow
ScreenToClient
EnumChildWindows
GetClassNameW
ClientToScreen
IsWindow
IsChild
RedrawWindow
GetClassInfoExW
GetFocus
CreateAcceleratorTableW
SetFocus
GetWindow
InvalidateRgn
LoadCursorW
GetSystemMetrics
GetCursorPos
VkKeyScanW
PostMessageW
InflateRect
SetRect
PtInRect
OffsetRect
GetParent
BitBlt
GetDeviceCaps
GetObjectW
CreateSolidBrush
GetStockObject
DeleteObject
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
GetUserNameA
CloseServiceHandle
QueryServiceStatus
StartServiceW
ChangeServiceConfigW
OpenServiceA
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyExW
RegCloseKey
OpenSCManagerW
SHGetPathFromIDListW
SHGetFolderLocation
ShellExecuteW
CLSIDFromProgID
CoUninitialize
CoTaskMemAlloc
OleInitialize
StringFromGUID2
StringFromCLSID
CLSIDFromString
OleUninitialize
CoCreateInstance
OleLockRunning
CoGetClassObject
CreateStreamOnHGlobal
CoTaskMemFree
CoInitialize
SysAllocStringLen
VariantClear
SysStringLen
VariantCopy
SysFreeString
VariantInit
SysAllocString
SafeArrayAccessData
SafeArrayUnaccessData
LoadRegTypeLi
LoadTypeLi
SysStringByteLen
SafeArrayGetLBound
OleCreateFontIndirect
SafeArrayGetUBound
DispCallFunc
PathFindOnPathW
PathFileExistsW
PathIsRelativeW
PathFindFileNameW
PathFindExtensionW
StrStrIW
UrlCanonicalizeW
CoInternetGetSession
URLDownloadToFileW
URLDownloadToCacheFileW
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
FindCloseUrlCache
DeleteUrlCacheEntryW
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
InternetCrackUrlW
InternetCanonicalizeUrlW
CloseExistedDll
CloseExistedDllByRundll32
CreateTask
Seek
SendStatisticDataOnInstall
UpdateIFEOInfo
fnClose
fnOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ