DllInit
DllInstall
Static task
static1
Behavioral task
behavioral1
Sample
88fa54cece076c5c39edb20c31d08da95386543e9259da685fef8712286f76aa.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88fa54cece076c5c39edb20c31d08da95386543e9259da685fef8712286f76aa.dll
Resource
win10v2004-20220901-en
Target
88fa54cece076c5c39edb20c31d08da95386543e9259da685fef8712286f76aa
Size
76KB
MD5
699fc09f92e5ba916afe27c8995e8260
SHA1
7a66c867652e1d58dddfffbac3533fa84bc9b5b5
SHA256
88fa54cece076c5c39edb20c31d08da95386543e9259da685fef8712286f76aa
SHA512
3292f86a3660088c65aeb58b4b0ee92492d6b1fe079265e3baa713116ecce5668df3fdfa7b2db37d14ed017a7381a9420df1b0e6c19cb27779595a91271523f5
SSDEEP
1536:VCE9VTlX+v8LVss2LpFWygu5MrRoC+hxVvD2fJo:39VT6kss2VOu5MrRoL9ifJ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualQuery
GetModuleHandleA
InitializeCriticalSection
HeapAlloc
InterlockedExchange
GetProcAddress
lstrlenW
GetLastError
WaitForSingleObject
lstrlenA
LeaveCriticalSection
CloseHandle
VirtualProtect
HeapFree
LoadLibraryA
ReleaseMutex
GetProcessHeap
GetModuleFileNameA
CreateThread
CreateDirectoryA
lstrcatW
lstrcpyW
UnmapViewOfFile
CopyFileA
FindVolumeMountPointClose
VirtualAllocEx
GetFullPathNameA
ReadDirectoryChangesW
SetDefaultCommConfigW
GetEnvironmentStringsW
WaitNamedPipeW
EnumSystemLocalesA
GetFileAttributesA
ReadConsoleA
ConvertDefaultLocale
LocalHandle
OpenFile
FindAtomW
GetCompressedFileSizeW
GetDateFormatW
SleepEx
TryEnterCriticalSection
SwitchToThread
TerminateProcess
CompareFileTime
FlushViewOfFile
ReadFile
FindFirstVolumeW
GetAtomNameA
GetProfileIntA
GetComputerNameExW
FreeEnvironmentStringsW
FindNextFileW
GetStdHandle
GetFileSize
GetTapeParameters
CreateSemaphoreA
EnumResourceNamesA
GlobalReAlloc
GetComputerNameW
FormatMessageW
CancelIo
SetWaitableTimer
GetDiskFreeSpaceW
DeleteTimerQueueEx
ChangeTimerQueueTimer
WinExec
GetSystemPowerStatus
GetLogicalDriveStringsW
GetModuleHandleW
WaitNamedPipeA
OpenMutexW
ReadConsoleInputA
HeapUnlock
SetConsoleCtrlHandler
UnregisterWait
GetDriveTypeA
CreateTimerQueueTimer
WriteFile
FlushFileBuffers
RemoveDirectoryA
GetSystemTime
SearchPathA
SetConsoleMode
LocalAlloc
GetModuleFileNameW
AddAtomW
SetNamedPipeHandleState
DisconnectNamedPipe
GetFileAttributesExW
GetCPInfo
VerifyVersionInfoW
GetHandleInformation
VirtualFree
ClearCommError
GetCurrentDirectoryW
ExitProcess
GetTimeZoneInformation
HeapCompact
EnumResourceNamesW
GetDateFormatA
DeleteFileA
MultiByteToWideChar
GetTickCount
OpenSemaphoreA
GetStringTypeExA
GetSystemInfo
Sleep
ReleaseSemaphore
GlobalAddAtomW
HeapDestroy
FindVolumeClose
DeleteTimerQueueTimer
SetHandleInformation
ReadFileEx
CreateNamedPipeW
GetCurrentThreadId
GetFullPathNameW
GetProfileIntW
GetVolumeInformationW
SetVolumeLabelA
GetWindowsDirectoryA
SetEnvironmentVariableA
CallNamedPipeA
VirtualUnlock
GetProcessAffinityMask
FreeConsole
FileTimeToDosDateTime
CreateEventW
GetVolumeNameForVolumeMountPointW
SetErrorMode
GlobalAddAtomA
CompareStringA
GetLogicalDriveStringsA
GetLargestConsoleWindowSize
HeapWalk
CreateToolhelp32Snapshot
GetConsoleCP
LocalFileTimeToFileTime
PulseEvent
QueryPerformanceFrequency
CreateDirectoryW
SetProcessShutdownParameters
GetLongPathNameW
OleCreateMenuDescriptor
CoAllowSetForegroundWindow
OleCreateFromFile
CreateDataAdviseHolder
OleDuplicateData
CoUnmarshalInterface
OleSaveToStream
CoRevertToSelf
OleCreateLink
OleInitialize
OleRegGetMiscStatus
OleRun
StgOpenStorageEx
CoInitializeEx
OleDestroyMenuDescriptor
CoFreeUnusedLibrariesEx
StringFromIID
CoGetCallContext
OleSetMenuDescriptor
CoCreateGuid
OleCreate
IIDFromString
PropVariantCopy
OleCreateLinkFromData
RevokeDragDrop
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
StrStrIW
SHRegGetValueW
PathFindFileNameW
PathCanonicalizeW
UrlCombineW
AssocQueryStringW
StrDupA
PathMatchSpecW
StrCmpW
PathRemoveFileSpecW
StrFormatKBSizeW
wvnsprintfW
StrChrW
PathFileExistsW
PathFileExistsA
PathIsUNCServerShareW
PathIsUNCW
SHGetValueA
PathFindNextComponentW
SHSetValueA
SHRegSetUSValueW
SHCreateStreamOnFileW
StrRChrW
PathAddBackslashA
PathFindFileNameA
SHRegGetBoolUSValueW
SHCreateShellPalette
PathQuoteSpacesW
PathCreateFromUrlW
StrStrIA
DllInit
DllInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ