DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Rundll32_
Static task
static1
Behavioral task
behavioral1
Sample
a7a2b24b72d693d7bfd9b4c4f76aab5e9a2c2df1dfb9e1f7d81f378d4515e8ea.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a7a2b24b72d693d7bfd9b4c4f76aab5e9a2c2df1dfb9e1f7d81f378d4515e8ea.dll
Resource
win10v2004-20220901-en
Target
a7a2b24b72d693d7bfd9b4c4f76aab5e9a2c2df1dfb9e1f7d81f378d4515e8ea
Size
110KB
MD5
b8c938b570f7c84e13498b92c359c090
SHA1
9301050c10e83682f962c11d959d45a3b59eb617
SHA256
a7a2b24b72d693d7bfd9b4c4f76aab5e9a2c2df1dfb9e1f7d81f378d4515e8ea
SHA512
7b29d4263f7144acd1e6cfd9c39c89fe14d26573a568310f241877578c198e08acb73145371c0a0640efbd575e76968b7a9296af153c75417511c40ae8a9d3f8
SSDEEP
1536:bJFGp2yZ9iJU0VM/3SuMhHcrEtvECG/3Jc4qMZXwY0U60LyOnPQ+:tpVCxMdcwhQ3Jc4qMZXwY0UlJo+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetExitCodeThread
CreateRemoteThread
VirtualAllocEx
lstrlenW
OpenProcess
MultiByteToWideChar
WideCharToMultiByte
SetLastError
TlsSetValue
TlsGetValue
SystemTimeToFileTime
GetSystemTime
lstrlenA
IsBadWritePtr
TlsAlloc
TlsFree
GetLastError
CreateMutexA
GetModuleFileNameW
lstrcpynA
GetVersionExA
VirtualFreeEx
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
LeaveCriticalSection
EnterCriticalSection
ReadFile
GetFileSize
CreateFileA
GetShortPathNameA
GetLongPathNameA
OpenMutexA
GetACP
IsDebuggerPresent
LoadLibraryW
GetProcessHeap
HeapAlloc
HeapFree
DeleteCriticalSection
InitializeCriticalSection
FindCloseChangeNotification
GetSystemDirectoryA
GetWindowsDirectoryA
FindFirstChangeNotificationA
WaitForMultipleObjects
Sleep
CloseHandle
WaitForSingleObject
TerminateThread
GetModuleFileNameA
CopyFileA
LoadLibraryExA
FreeLibrary
DeleteFileA
VirtualQuery
lstrcmpiA
CreateToolhelp32Snapshot
ReadProcessMemory
GetVersion
VirtualProtect
WriteProcessMemory
GetCurrentProcessId
Module32First
Module32Next
GetModuleHandleA
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
GetProcAddress
LoadLibraryA
lstrcmpA
lstrcpyA
FindFirstFileA
FindClose
IsBadStringPtrA
WritePrivateProfileSectionA
WriteFile
MoveFileExA
GetTickCount
DeviceIoControl
GetPrivateProfileStructA
GetTempPathA
GetPrivateProfileIntA
Process32First
Process32Next
CreateProcessA
InterlockedDecrement
WritePrivateProfileStructA
FindWindowA
GetWindowThreadProcessId
RegisterWindowMessageA
FindWindowExA
SetWindowsHookExA
DispatchMessageA
GetClassNameA
PostMessageA
TranslateMessage
IsWindow
EnumWindows
SendMessageA
GetParent
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
KillTimer
DestroyWindow
PostQuitMessage
SetTimer
GetClassInfoExA
RegisterClassExA
CreateWindowExA
SetWindowLongA
GetWindowLongA
DefWindowProcA
GetMessageA
GetStockObject
RegQueryValueExA
RegOpenKeyExA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
RegOpenKeyA
RegEnumKeyExA
RegCloseKey
RegEnumKeyA
RegEnumValueA
RegQueryValueExW
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegCreateKeyA
RegSetValueExA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
DeleteService
OpenServiceA
ControlService
QueryServiceStatus
StartServiceA
RegSetValueExW
RegOpenKeyExW
CoTaskMemFree
StringFromCLSID
SysFreeString
SysAllocString
SHSetValueA
PathFileExistsA
PathFindExtensionA
PathRemoveBlanksA
PathRemoveBackslashA
PathRemoveFileSpecA
PathRemoveExtensionA
SHGetValueA
SHDeleteKeyA
PathAppendA
SHDeleteValueA
PathFindFileNameA
StrStrIA
PathStripToRootA
ImageDirectoryEntryToData
memmove
_CxxThrowException
_mbsicmp
wcscpy
sprintf
_mbsnbicmp
_mbschr
rand
srand
time
_mbscmp
_mbsnbcpy
_snprintf
fclose
fwrite
fopen
sscanf
wcslen
_wcsicmp
_tempnam
fread
malloc
fseek
ftell
fputs
strstr
fgets
rewind
wcsstr
strrchr
strchr
_vsnprintf
atoi
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
free
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
tmpnam
_strnicmp
_stricmp
_itoa
_strlwr
_wcsset
_strnset
realloc
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Rundll32_
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ