CallFncW
GetAddresses
InitEplgOE
InjectDll
Static task
static1
Behavioral task
behavioral1
Sample
ca09cd57c45a8dc91b37d5ed49347001ccceeffee9f355a94bf7e665577d9e48.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca09cd57c45a8dc91b37d5ed49347001ccceeffee9f355a94bf7e665577d9e48.dll
Resource
win10v2004-20220812-en
Target
ca09cd57c45a8dc91b37d5ed49347001ccceeffee9f355a94bf7e665577d9e48
Size
480KB
MD5
d5626130f0ce60066660f30874bdc980
SHA1
1b016ad2967407cc16c1861f0493dc85882454ed
SHA256
ca09cd57c45a8dc91b37d5ed49347001ccceeffee9f355a94bf7e665577d9e48
SHA512
b0ecb539b93e2dfc61ee63a20dc04c4c247488ac7f2f0825f6c0c6c176a63883dab4a58c49930c9412e8eab3ee51f4afa8adfb587da65d9cfaef2dd5a4927933
SSDEEP
3072:Ok2Botky0UqRdQeUUaAJ3KdmRjgEtojsl1tzz+kKStq+vDawvNxTct4Ag0FuheVE:C5Nad+jHool1xLKwC4AOhex
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_GetIconSize
FindClose
CreateFileW
CreateDirectoryW
CopyFileW
GetFileAttributesW
MoveFileW
CreateFileA
GetVersionExW
CreateEventW
SetEvent
EnterCriticalSection
LeaveCriticalSection
TerminateThread
ResetEvent
InterlockedIncrement
WaitForMultipleObjects
DuplicateHandle
InitializeCriticalSection
DeleteCriticalSection
CreateMutexW
CreateFileMappingW
VirtualAlloc
ReleaseMutex
OpenMutexW
LocalFree
FindResourceW
LocalAlloc
GetModuleHandleA
lstrcmpA
lstrlenA
SetThreadPriority
GetCurrentThread
GetSystemTimeAsFileTime
GetTickCount
GetTimeZoneInformation
LoadLibraryExW
FileTimeToSystemTime
ReadFile
WriteFile
SetEndOfFile
SetFilePointer
GetTempFileNameW
FlushFileBuffers
GetFileInformationByHandle
DeleteFileW
IsBadStringPtrA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetFullPathNameW
lstrlenW
lstrcpynW
GetFullPathNameA
AreFileApisANSI
lstrcpynA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
RtlUnwind
LoadLibraryA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
RaiseException
VirtualFree
HeapCreate
HeapDestroy
ExitProcess
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
SetUnhandledExceptionFilter
InterlockedDecrement
GetVersion
FindFirstFileA
GetFileAttributesA
GetCurrentThreadId
VirtualProtect
GetCurrentProcessId
CreateThread
SetLastError
GetTempPathW
LoadLibraryW
SetErrorMode
DisableThreadLibraryCalls
UnmapViewOfFile
MapViewOfFile
OpenFileMappingW
GetProcAddress
GetModuleHandleW
CloseHandle
VirtualFreeEx
ReadProcessMemory
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
GetCurrentProcess
VirtualAllocEx
GetLastError
OpenProcess
Sleep
FreeLibrary
GetModuleFileNameW
UnhandledExceptionFilter
TerminateProcess
GetProcessHeap
GetVersionExA
GetCommandLineA
HeapReAlloc
HeapAlloc
DeleteFileA
FindNextFileA
FileTimeToLocalFileTime
HeapFree
CreatePopupMenu
SetTimer
GetWindowThreadProcessId
FindWindowW
SetWindowsHookExW
TrackPopupMenu
IsDlgButtonChecked
CheckDlgButton
CheckRadioButton
DialogBoxParamW
EndDialog
SetWindowPos
GetDesktopWindow
SetWindowTextW
GetDlgItem
MsgWaitForMultipleObjects
CallWindowProcW
GetClientRect
PostThreadMessageW
EnumChildWindows
DispatchMessageW
GetMenuItemInfoW
GetMenuItemCount
InsertMenuItemW
AppendMenuW
MessageBoxW
LoadStringW
DestroyWindow
TranslateMessage
PeekMessageW
LoadImageW
FindWindowExW
CreateWindowExW
GetWindowRect
IsWindow
CallNextHookEx
SetWindowLongW
SendMessageW
GetClassNameW
PostMessageW
UnhookWindowsHookEx
GetMenuItemID
KillTimer
IsMenu
TrackPopupMenuEx
MapWindowPoints
DestroyMenu
DeleteObject
GetObjectW
RegDeleteKeyA
EqualSid
RegQueryValueExA
RegOpenKeyA
FreeSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyW
SHGetPathFromIDListA
ShellExecuteExW
ord680
SHGetDesktopFolder
SHGetPathFromIDListW
SHGetMalloc
CoInitializeEx
CoUninitialize
CoTaskMemFree
PropVariantClear
CallFncW
GetAddresses
InitEplgOE
InjectDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ