DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2322e3213318e3d3b7e830491ab79b8bc331121f9f3c1fdc4af7215afd34ca09.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2322e3213318e3d3b7e830491ab79b8bc331121f9f3c1fdc4af7215afd34ca09.dll
Resource
win10v2004-20220812-en
Target
2322e3213318e3d3b7e830491ab79b8bc331121f9f3c1fdc4af7215afd34ca09
Size
355KB
MD5
3299380ac72a160b56e5d41dd214b745
SHA1
cb5e481ae283b72c274482f35a28ce09728c6483
SHA256
2322e3213318e3d3b7e830491ab79b8bc331121f9f3c1fdc4af7215afd34ca09
SHA512
f07197c98f2a6d9e3d5ad5777dc18a579c5969005df8e1f03f9fb1ec06e2383fdc28fc43a5f18783a692d54b54699da05a87bb1d82ae8634ae240750b5ea1bc7
SSDEEP
6144:LrcnPk+pNuanqXfSN2ROYqZR/upbPaLa37cuS8DRYp6+HFQbohvfd78eGkdVX:LrcnPk+LuaqP5RnqZR/QaUcuiFQboBfN
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
lstrcmpiW
SizeofResource
LoadResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CreateProcessW
CloseHandle
WaitForSingleObject
GetExitCodeProcess
TerminateProcess
OpenProcess
FindNextFileW
FindFirstFileW
CreateDirectoryW
FindClose
GetCurrentProcessId
WritePrivateProfileStringW
SetThreadLocale
GetThreadLocale
DecodePointer
EncodePointer
FindResourceW
GetModuleHandleW
LoadLibraryExW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
LoadLibraryW
GetCurrentProcess
GetProcAddress
FreeLibrary
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
IsDebuggerPresent
OutputDebugStringW
SetLastError
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetStringTypeW
GetCPInfo
GetTempPathW
RemoveDirectoryW
DeleteFileW
MoveFileExW
LocalAlloc
LocalFree
GetCurrentThreadId
lstrlenW
WinExec
GetSystemDirectoryW
CopyFileW
GetFileSize
WriteFile
ReadFile
CreateFileW
GetSystemInfo
GetVersionExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetACP
GetTimeZoneInformation
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
FlushFileBuffers
SetStdHandle
CharNextW
LoadStringW
LookupAccountNameW
OpenProcessToken
GetTokenInformation
SetTokenInformation
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
LookupAccountSidW
CreateProcessAsUserW
DuplicateTokenEx
RegCreateKeyW
RegSetValueW
EqualSid
GetLengthSid
InitializeAcl
GetAclInformation
AddAce
GetAce
AddAccessAllowedAce
GetSecurityDescriptorControl
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetSecurityDescriptorDacl
SetFileSecurityW
GetFileSecurityW
SHGetSpecialFolderPathW
SHFileOperationW
ShellExecuteExW
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
StringFromGUID2
CoTaskMemAlloc
RegisterTypeLi
SysAllocString
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
SysStringLen
SysFreeString
UnRegisterTypeLi
PathFileExistsW
DestroyEnvironmentBlock
CreateEnvironmentBlock
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ