DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a25651405e5cde31ef8ef6206c33b44b2a32d389201004611d511bc066f57425.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a25651405e5cde31ef8ef6206c33b44b2a32d389201004611d511bc066f57425.dll
Resource
win10v2004-20220812-en
Target
a25651405e5cde31ef8ef6206c33b44b2a32d389201004611d511bc066f57425
Size
158KB
MD5
6922a69f56aeb58b5f3e6def8cca41e1
SHA1
6051b303e6b1e721d2bb77d1e6059c7305c530b4
SHA256
a25651405e5cde31ef8ef6206c33b44b2a32d389201004611d511bc066f57425
SHA512
1754fbbc53603c113559f3d3bce2a2ed4000f13d033474d095712ff4c2785df457a10122f8b1b08d4fa335c50b2b74048b68e5c8c957a2d6bb2d1bd1319dcc50
SSDEEP
3072:r2BnCf3tycqeV5UaH+lgU0z1RCzDOVdcsJ1KhbUxX5xttfnl/8g:r2RCfdynefUQ+lgU05RCCcsJ1yUdnlE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
WaitForSingleObject
CreateMutexA
GetCurrentProcessId
LoadLibraryExA
GetModuleHandleA
GetSystemDirectoryA
GetVersionExA
GetFileAttributesA
GetLocaleInfoA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
Sleep
GetDriveTypeA
GetStdHandle
WriteFile
ExitProcess
IsValidCodePage
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
ReleaseMutex
HeapDestroy
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualProtect
GetFullPathNameA
RtlUnwind
HeapReAlloc
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetACP
InterlockedExchange
GetSystemTimeAsFileTime
SetEnvironmentVariableA
SetEnvironmentVariableW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCurrentDirectoryA
CompareStringA
CompareStringW
CloseHandle
GetProcAddress
GetModuleFileNameA
GetThreadLocale
SetThreadLocale
GetModuleHandleW
LoadLibraryExW
SizeofResource
FreeLibrary
GetModuleFileNameW
lstrcmpW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
GlobalHandle
GlobalFree
LoadResource
LockResource
GlobalLock
GetTickCount
GlobalUnlock
GetCurrentThreadId
SetLastError
MulDiv
FindResourceW
GlobalAlloc
GetCurrentProcess
FlushInstructionCache
LeaveCriticalSection
EnterCriticalSection
SetErrorMode
FindFirstFileA
FindNextFileA
FindClose
lstrcmpiW
DeleteCriticalSection
InitializeCriticalSection
GetLastError
WideCharToMultiByte
lstrlenA
OutputDebugStringW
DebugBreak
InterlockedIncrement
InterlockedDecrement
lstrlenW
MultiByteToWideChar
RaiseException
WriteConsoleW
CreateFileA
FlushFileBuffers
HeapCreate
CreateSolidBrush
SetBkColor
CreatePen
SelectObject
RoundRect
GetTextColor
SetTextColor
DeleteObject
SetBkMode
GetTextExtentPoint32W
GetDeviceCaps
CreateFontIndirectW
RestoreDC
DeleteDC
SelectClipRgn
SetWindowOrgEx
SetMapMode
SaveDC
LPtoDP
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
DeleteMetaFile
CloseMetaFile
SetWindowExtEx
CreateMetaFileW
GetObjectW
GetTextMetricsW
CreateRectRgn
GetClipRgn
SetViewportOrgEx
GetStockObject
Rectangle
ExtSelectClipRgn
CreateRectRgnIndirect
CreateDCW
ExcludeClipRect
ExtTextOutW
CommDlgExtendedError
GetOpenFileNameW
RegOpenKeyExA
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ