DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f2637374ed6cc91a9220439b680eb4e7b1c2979449b7fa27575a26690636b76c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2637374ed6cc91a9220439b680eb4e7b1c2979449b7fa27575a26690636b76c.dll
Resource
win10v2004-20220812-en
Target
f2637374ed6cc91a9220439b680eb4e7b1c2979449b7fa27575a26690636b76c
Size
336KB
MD5
488dc88472894a705949458f75acebeb
SHA1
9271f45e8bc8590e7bfd92ed2e706b83566a9bae
SHA256
f2637374ed6cc91a9220439b680eb4e7b1c2979449b7fa27575a26690636b76c
SHA512
1092ee8f5e9ed0dba002ab719b6cd5b6c940c7e247edbf55abea85b890c79921ffac3d76991d696b6485fd552805e98e0c738a972e1b783505a5212de0da21e6
SSDEEP
6144:koTkLo4LKRadsL/kOPk5GYTNvCX1jmmoRdDdw8:koTkfKRadsbdPCG+al5A5dB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DisableThreadLibraryCalls
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
GetShortPathNameA
GetModuleHandleA
lstrlenW
lstrcmpiA
HeapDestroy
CloseHandle
UnmapViewOfFile
ReadFile
CreateFileA
lstrlenA
CreateEventA
GetFileSize
FindClose
FindFirstFileA
GetFileAttributesA
WaitForSingleObject
SetEvent
FreeLibrary
LoadLibraryA
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
InterlockedDecrement
FlushFileBuffers
LocalFree
InterlockedIncrement
FormatMessageA
WideCharToMultiByte
SetLastError
QueryPerformanceFrequency
GetLastError
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
GetCurrentProcess
TlsGetValue
TlsFree
TlsAlloc
Sleep
InterlockedExchange
GetLocalTime
GetCurrentProcessId
GetVersion
GetWindowsDirectoryA
lstrcatA
lstrcpynA
WriteFile
SetFilePointer
CompareStringA
CompareStringW
GetVersionExA
MapViewOfFile
CreateFileMappingA
VirtualQuery
VirtualProtect
SearchPathA
lstrcpyA
ResetEvent
GetTickCount
QueryPerformanceCounter
SystemTimeToFileTime
TerminateProcess
RaiseException
RtlUnwind
CreateThread
GetCurrentThreadId
TlsSetValue
ExitThread
GetCommandLineA
HeapFree
HeapAlloc
ExitProcess
SetUnhandledExceptionFilter
PeekMessageA
MsgWaitForMultipleObjects
TranslateMessage
wsprintfA
LoadStringA
GetDesktopWindow
GetMessageA
DispatchMessageA
CharLowerBuffA
PostThreadMessageA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
RegEnumKeyExA
StringFromCLSID
CoCreateInstance
CLSIDFromProgID
CoGetInterfaceAndReleaseStream
CoUninitialize
CoMarshalInterThreadInterfaceInStream
ProgIDFromCLSID
CoInitialize
CoTaskMemFree
VariantClear
GetErrorInfo
SysStringByteLen
SysAllocStringByteLen
DispGetParam
VariantCopyInd
SafeArrayCreate
SafeArrayGetElement
SafeArrayPutElement
LoadRegTypeLi
CreateErrorInfo
SetErrorInfo
SafeArrayRedim
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysAllocStringLen
SafeArrayDestroy
SysFreeString
SysStringLen
SysReAllocStringLen
VariantChangeType
SysAllocString
VariantCopy
VariantInit
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE