DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetShortcutTargetPath
IsIntegrityLevelHigh
Static task
static1
Behavioral task
behavioral1
Sample
48b21dece74b5f2d66e2557ccbcf4d31276884d623d5b91f8fdfc394757da994.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48b21dece74b5f2d66e2557ccbcf4d31276884d623d5b91f8fdfc394757da994.dll
Resource
win10v2004-20220812-en
Target
48b21dece74b5f2d66e2557ccbcf4d31276884d623d5b91f8fdfc394757da994
Size
176KB
MD5
6134c09a212e99c949cf0844ea14d51b
SHA1
a0090a9e4299d2e6d697adeaaea0db0c70b72768
SHA256
48b21dece74b5f2d66e2557ccbcf4d31276884d623d5b91f8fdfc394757da994
SHA512
02edc72913db867a25141eb2e924ae07b02e5cdc68593be37bdd90434db5253c48f8969cfd7e8780c4f342032acba05203ece422982e63f1f68b0163f5ce861c
SSDEEP
3072:9DxBZqV2evBMJlF54yFh/WsD4G1v8fcBRRhAV2Y3ujEZ:rBV0Mp59Fh/Wq4m8cjRhVY3L
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapAlloc
GetProcessHeap
GetCurrentProcess
GetCurrentThread
WideCharToMultiByte
GetLongPathNameW
MultiByteToWideChar
lstrcpyW
GetModuleFileNameW
lstrcatW
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
lstrcpynW
GlobalUnlock
GlobalLock
FreeLibrary
SizeofResource
LoadResource
CloseHandle
LoadLibraryExW
GetModuleHandleW
GetCurrentThreadId
FlushInstructionCache
LCMapStringA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
GetCurrentProcessId
HeapFree
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
FindResourceW
InterlockedExchange
GetTickCount
GetSystemInfo
VirtualProtect
QueryPerformanceCounter
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetVersionExA
HeapReAlloc
GetCommandLineA
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
RtlUnwind
VirtualQuery
GetProcAddress
GetModuleHandleA
TerminateProcess
HeapSize
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
LCMapStringW
RegisterClassExW
LoadCursorW
wsprintfW
CreateWindowExW
DestroyWindow
SendMessageW
CallWindowProcW
GetWindowLongW
SetWindowLongW
DefWindowProcW
UnregisterClassW
CharNextW
GetClassInfoExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegQueryInfoKeyW
OpenThreadToken
OpenProcessToken
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
CreateStreamOnHGlobal
GetHGlobalFromStream
CoTaskMemFree
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
SysAllocString
SysStringByteLen
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysFreeString
PathFindExtensionW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetShortcutTargetPath
IsIntegrityLevelHigh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE