DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
882e9a572c71c904a78bf3257e1fb2f9d0e7dedb0436b18c74a6686688743596.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
882e9a572c71c904a78bf3257e1fb2f9d0e7dedb0436b18c74a6686688743596.dll
Resource
win10v2004-20220812-en
Target
882e9a572c71c904a78bf3257e1fb2f9d0e7dedb0436b18c74a6686688743596
Size
315KB
MD5
38402ddd344572f9b108626c23f18a20
SHA1
eb731d355637096193c5e47a8ffbf6815b175c89
SHA256
882e9a572c71c904a78bf3257e1fb2f9d0e7dedb0436b18c74a6686688743596
SHA512
c88d0dcd2491b3a0afb87a1f3b456ba56c1752efd1c5b6b32e0a0a2af47eaeee8546320b7fa2845c7f8dca87d8fd404ab10cfc62e9dac83e657a210fd8f3e0b7
SSDEEP
3072:1JGdAmYqKZEzVd/IBx4ZKnnkdV3owH5RfMfc4w0i82LRTtcouRKI:VmmSd/I4UUOewc4w82LdI
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegSetValueExW
EncodePointer
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
DecodePointer
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
ExitProcess
IsDebuggerPresent
VirtualQuery
TerminateProcess
GetCommandLineA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
HeapCreate
GetStdHandle
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetHandleCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InterlockedExchange
RtlUnwind
LCMapStringW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
DeleteCriticalSection
lstrcmpiW
LockResource
EnterCriticalSection
GetProcAddress
GetThreadLocale
GetLastError
SetThreadLocale
RaiseException
lstrlenW
MultiByteToWideChar
GetModuleFileNameW
lstrcpynW
LeaveCriticalSection
SizeofResource
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
InterlockedDecrement
InterlockedIncrement
LoadLibraryExW
LoadResource
FreeLibrary
FindResourceW
FindResourceExW
CloseHandle
InitializeCriticalSection
TryEnterCriticalSection
GetTickCount
Sleep
InterlockedCompareExchange
SetLastError
LoadLibraryW
GetCurrentProcess
GetEnvironmentVariableW
GetCurrentProcessId
GetCurrentThreadId
OutputDebugStringA
GetPrivateProfileIntW
GetPrivateProfileStringW
CreateFileW
WriteFile
SetFilePointer
WideCharToMultiByte
GetFileAttributesExW
GetSystemTimeAsFileTime
FlushFileBuffers
OleSaveToStream
CoTaskMemAlloc
CoTaskMemFree
ReadClassStm
CoGetStdMarshalEx
WriteClassStm
StringFromGUID2
CoTaskMemRealloc
CoCreateInstance
CoRegisterPSClsid
VariantClear
LoadTypeLi
SysAllocStringByteLen
VariantInit
VariantChangeType
VarUI4FromStr
SysStringByteLen
SysStringLen
LoadRegTypeLi
VARIANT_UserMarshal
BSTR_UserSize
VARIANT_UserSize
VARIANT_UserUnmarshal
BSTR_UserMarshal
BSTR_UserUnmarshal
VARIANT_UserFree
BSTR_UserFree
SysFreeString
CharNextW
SetClipboardData
EmptyClipboard
OpenClipboard
MessageBoxW
CharUpperW
CharLowerW
CloseClipboard
wsprintfW
PathRemoveExtensionW
PathRemoveFileSpecW
PathStripPathW
PathAppendW
IUnknown_AddRef_Proxy
NdrCStdStubBuffer2_Release
CStdStubBuffer_QueryInterface
CStdStubBuffer_DebugServerQueryInterface
IUnknown_Release_Proxy
NdrStubCall2
NdrDllCanUnloadNow
CStdStubBuffer_DebugServerRelease
NdrDllGetClassObject
NdrCStdStubBuffer_Release
NdrOleAllocate
NdrStubForwardingFunction
NdrOleFree
IUnknown_QueryInterface_Proxy
CStdStubBuffer_AddRef
CStdStubBuffer_Disconnect
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_Invoke
NdrDllRegisterProxy
NdrDllUnregisterProxy
CStdStubBuffer_CountRefs
CStdStubBuffer_Connect
SHGetFolderPathW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE