DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4425c7b23f0b3ae865cf27eaf742673ef198f37fc1120c817a263664113773ea.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4425c7b23f0b3ae865cf27eaf742673ef198f37fc1120c817a263664113773ea.dll
Resource
win10v2004-20220901-en
Target
4425c7b23f0b3ae865cf27eaf742673ef198f37fc1120c817a263664113773ea
Size
228KB
MD5
6527d9d5002d7b9c9c31164a6b1405e0
SHA1
faac3edaab7a97f183ba9394d054f799aa5bd50e
SHA256
4425c7b23f0b3ae865cf27eaf742673ef198f37fc1120c817a263664113773ea
SHA512
f47cc814643c70791510b8090cc970be1d6f15bc4f0542d7e5745d9b064b1fe0dc789f37133f587ec582cdcc6a801e61a38458bd4e3edaa483da17c2e7e2b029
SSDEEP
3072:cEhwUvEJqa7DDBEYyQHtRlBBBBBBBBqr2mdcbfJSBgXKwBlH3iI94e54SGF7bLG+:oEUdyuUAfXKwBlH3iIySGF7GDa
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadResource
FindResourceA
FindResourceExA
InterlockedIncrement
InterlockedDecrement
lstrlenA
lstrcmpiA
IsDBCSLeadByte
EnterCriticalSection
LeaveCriticalSection
LockResource
FreeLibrary
LoadLibraryExA
GetModuleHandleA
LocalFree
FormatMessageA
VirtualQuery
GetProcAddress
LoadLibraryA
SetCurrentDirectoryA
GetCurrentDirectoryA
SetThreadLocale
GetThreadLocale
GetLocaleInfoA
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
InterlockedExchange
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapSize
GetStdHandle
WriteFile
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
Sleep
HeapAlloc
HeapFree
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
CharNextA
UnregisterClassA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
SHGetFolderPathA
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
RegisterTypeLi
UnRegisterTypeLi
CreateErrorInfo
SetErrorInfo
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysAllocStringLen
SysFreeString
SysStringLen
BSTR_UserSize
BSTR_UserMarshal
BSTR_UserUnmarshal
BSTR_UserFree
NdrStubCall2
NdrStubForwardingFunction
NdrDllUnregisterProxy
NdrDllRegisterProxy
NdrCStdStubBuffer2_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrOleAllocate
NdrOleFree
IUnknown_QueryInterface_Proxy
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
PathFileExistsA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE