DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2b3c8f5307b2de13df46a0ea070a414b5adafb3532f91b08543e9708c27f2a43.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b3c8f5307b2de13df46a0ea070a414b5adafb3532f91b08543e9708c27f2a43.dll
Resource
win10v2004-20221111-en
Target
2b3c8f5307b2de13df46a0ea070a414b5adafb3532f91b08543e9708c27f2a43
Size
801KB
MD5
dff9fe8deb87c6c9b3ec3efad4131cfa
SHA1
5344d7c84c63e00b9a00a94c1dc2166b70a805d6
SHA256
2b3c8f5307b2de13df46a0ea070a414b5adafb3532f91b08543e9708c27f2a43
SHA512
9896a57d75865effe955630a139c3d10b50d1fa10287f610a4ffc4aa4178724d41780761b6f0d7b13c87804f8287443f3989caffc38bb6d6e65eef0a66081b02
SSDEEP
12288:eH3rpOnpk/FeYLc+R1zF4B3PrAhGQF/mohQxuPy:IVopk/YYA+R1zuB3PrAhfF/m+Qx
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
WaitForSingleObject
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentThreadId
GetLastError
GetModuleHandleW
DecodePointer
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetExitCodeProcess
GlobalUnlock
lstrcpynW
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
OpenProcess
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetACP
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
LoadLibraryExW
InterlockedFlushSList
RtlUnwindEx
GlobalLock
TerminateProcess
CreateDirectoryW
GetCurrentProcessId
FreeLibrary
CreateFileW
GetTempPathW
CloseHandle
FindClose
ReadFile
WriteFile
GetModuleFileNameW
RtlPcToFileHeader
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
EncodePointer
WritePrivateProfileStringW
GetPrivateProfileIntW
lstrlenW
GetPrivateProfileStringW
LoadLibraryW
GetCurrentProcess
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
QueryPerformanceCounter
LoadStringW
wsprintfW
LoadBitmapW
InsertMenuItemW
SetMenuItemBitmaps
InsertMenuW
CreatePopupMenu
DeleteObject
OpenProcessToken
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegDeleteKeyW
RegDeleteValueW
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
ImpersonateLoggedOnUser
RevertToSelf
RegCloseKey
SHGetFolderPathW
DragQueryFileW
SHGetSpecialFolderPathW
CoInitialize
ReleaseStgMedium
IIDFromString
PathFileExistsW
StrStrIW
PathAppendW
PathFindExtensionW
PathIsDirectoryW
PathRemoveFileSpecW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ