DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2a9e030f44c999f81bc1f56a0736f074849e72b5fe073c5d3d8d148f7af5189b.dll
Resource
win7-20220901-en
Target
2a9e030f44c999f81bc1f56a0736f074849e72b5fe073c5d3d8d148f7af5189b
Size
260KB
MD5
bce36e2ac70c5b17f520466d911f0ef3
SHA1
9fe50bb27320828f44f1ef2611bbf26745569970
SHA256
2a9e030f44c999f81bc1f56a0736f074849e72b5fe073c5d3d8d148f7af5189b
SHA512
8a3c7d36f5a913960eb89eeacb120b1230aba80eee4b9b9d1d038054e0dcc96737ab13511358e01698fd6b3f5b18084dfb04d349df0444267a17656bcdbb9d84
SSDEEP
6144:Fpp8+ZheQlRGKvpW/d0S+ddDCMJroWkAsvMsa0K:F38+XeQHv4/65lhxkAsvp5K
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LockResource
LoadResource
FindResourceExA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
RaiseException
GetModuleHandleA
IsDBCSLeadByte
lstrcpynA
GetBinaryTypeA
GetFullPathNameA
QueryDosDeviceA
OpenFileMappingA
UnlockFile
GetFileAttributesA
WinExec
DeleteFileA
CopyFileA
SetFileAttributesA
GetSystemDirectoryA
GetWindowsDirectoryA
CloseHandle
CreateProcessW
GetShortPathNameA
GetDiskFreeSpaceExA
SetFilePointer
GetLogicalDriveStringsA
WaitForSingleObject
CreateProcessA
CreateEventA
GetLogicalDrives
SizeofResource
lstrcatA
Process32Next
Process32First
CreateToolhelp32Snapshot
Module32Next
Module32First
CreateRemoteThread
GetProcAddress
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileExA
FreeLibrary
LoadLibraryA
FindClose
FindNextFileA
lstrcmpA
FindFirstFileA
OpenMutexA
GetVolumeInformationA
SetFileTime
SystemTimeToFileTime
CreateFileA
GetSystemTime
CreateDirectoryA
SetSystemTime
DeviceIoControl
ReadFile
FlushFileBuffers
SetStdHandle
GetProcessHeap
FindResourceA
lstrcpyA
GetLastError
UnmapViewOfFile
SetEndOfFile
GetVersionExA
GetModuleFileNameA
lstrlenA
lstrcmpiA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetCurrentDirectoryA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
LCMapStringW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
MoveFileA
GetCurrentThreadId
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
CharNextA
GetTextCharsetInfo
RegDeleteKeyA
OpenProcessToken
RegSetKeySecurity
RegSetValueA
RegQueryValueA
OpenServiceA
QueryServiceStatus
OpenSCManagerA
OpenServiceW
CloseServiceHandle
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
CreateProcessAsUserW
RegOpenKeyA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
SHGetFileInfoA
CoGetClassObject
StringFromGUID2
CoCreateInstance
CoTaskMemFree
StringFromCLSID
CoUninitialize
CoInitialize
SysFreeString
SysStringLen
LoadRegTypeLi
VariantInit
VarUI4FromStr
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
PathFindExtensionA
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ