DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4690118e97a83575578f57b17a82f7332322b33f32b1e31084fbf1c859b4ea2c.dll
Resource
win7-20220812-en
Target
4690118e97a83575578f57b17a82f7332322b33f32b1e31084fbf1c859b4ea2c
Size
328KB
MD5
6d9dc5089127367159f92236c1408b40
SHA1
599dec5d54b0a4e0e8ab8121674d6b630aa65824
SHA256
4690118e97a83575578f57b17a82f7332322b33f32b1e31084fbf1c859b4ea2c
SHA512
52c8d06763f1c00aca08b56c7a7070fd44dcdb2808be9f04b5e71bdf9a5b70ebfa08872cad84cbce0f12af006dd5a7efaa870550b01331783d7151d1cfff672c
SSDEEP
6144:ueuKc2MvC6nI6ysyvtdsCe1psrAxWM6LZxKRFkr0fGZPs:ueuKX6nI6ys0KCGs0xWB4er0fkU
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DisableThreadLibraryCalls
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
GetShortPathNameA
GetModuleHandleA
lstrlenW
lstrcmpiA
HeapDestroy
CloseHandle
UnmapViewOfFile
ReadFile
CreateFileA
QueryPerformanceFrequency
CreateEventA
GetFileSize
FindClose
FindFirstFileA
GetFileAttributesA
WaitForSingleObject
SetEvent
FreeLibrary
LoadLibraryA
GetProcAddress
GetLocalTime
GetCurrentProcessId
GetVersion
GetWindowsDirectoryA
lstrcatA
lstrcpynA
WriteFile
Sleep
SetFilePointer
CompareStringA
lstrlenA
GetVersionExA
MapViewOfFile
CreateFileMappingA
VirtualQuery
VirtualProtect
SearchPathA
lstrcpyA
ResetEvent
GetTickCount
QueryPerformanceCounter
SystemTimeToFileTime
TerminateProcess
FlushFileBuffers
SetStdHandle
IsBadCodePtr
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
InterlockedDecrement
LocalFree
InterlockedIncrement
FormatMessageA
WideCharToMultiByte
SetLastError
CompareStringW
GetLastError
IsBadReadPtr
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
GetCurrentProcess
TlsGetValue
TlsFree
TlsAlloc
SetUnhandledExceptionFilter
ExitProcess
HeapAlloc
HeapFree
GetCommandLineA
ExitThread
TlsSetValue
GetCurrentThreadId
CreateThread
RtlUnwind
RaiseException
InterlockedExchange
wsprintfA
LoadStringA
GetDesktopWindow
DispatchMessageA
MsgWaitForMultipleObjects
CharLowerBuffA
TranslateMessage
PeekMessageA
PostThreadMessageA
GetMessageA
RegQueryValueA
RegOpenKeyA
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
StringFromCLSID
CoCreateInstance
CLSIDFromProgID
CoGetInterfaceAndReleaseStream
CoUninitialize
CoMarshalInterThreadInterfaceInStream
CoInitialize
ProgIDFromCLSID
CoTaskMemFree
SysAllocString
VariantClear
VariantInit
VariantCopy
GetErrorInfo
SysStringByteLen
SysAllocStringByteLen
DispGetParam
VariantCopyInd
SafeArrayCreate
SafeArrayGetElement
SafeArrayPutElement
LoadRegTypeLi
CreateErrorInfo
SetErrorInfo
SafeArrayRedim
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysAllocStringLen
SafeArrayDestroy
SysFreeString
SysStringLen
SysReAllocStringLen
VariantChangeType
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE