DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6124033fb0ddf5e242de9fb231e7772df0e584ebeb4c94074b9dc18fe3dd4b74.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6124033fb0ddf5e242de9fb231e7772df0e584ebeb4c94074b9dc18fe3dd4b74.dll
Resource
win10v2004-20220812-en
Target
6124033fb0ddf5e242de9fb231e7772df0e584ebeb4c94074b9dc18fe3dd4b74
Size
280KB
MD5
4dd1f8381f4bcf743d15ef1c7b44faee
SHA1
fb08e90f70458e2548203b45ee7218f5067765ea
SHA256
6124033fb0ddf5e242de9fb231e7772df0e584ebeb4c94074b9dc18fe3dd4b74
SHA512
165c89eb4c21bd240e4b9bc7753a99af04a3910d591315b10b1bec13cd9dd2a825d348ea2f3182dcb95a4b89fbe74c9aa2ac6daf5b2ff164e29e55493abaec0a
SSDEEP
6144:ZqKtWPg0q683f085Z41k4HDLQ3alhOa6J9wnMsPwD2THxIeM4KLJZq/8l4N97s:ZhtWfv/OhsPwDss4K94y4o
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__dllonexit
malloc
free
realloc
wcslen
_purecall
_wcsicmp
wcscmp
wcscat
memmove
_wcsnicmp
swprintf
wcschr
wcscpy
_wtol
sprintf
_onexit
_except_handler3
_adjust_fdiv
_initterm
LoadLibraryI
PostMessageI
GetWindowsDirectoryI
_LoadVersionedResourceEx@16
??1CReaderWriterLock3@@QAE@XZ
??0CReaderWriterLock3@@QAE@XZ
?WriteLock@CReaderWriterLock3@@QAEXXZ
?WriteUnlock@CReaderWriterLock3@@QAEXXZ
?ReadOrWriteLock@CReaderWriterLock3@@QAE_NXZ
?ReadOrWriteUnlock@CReaderWriterLock3@@QAEX_N@Z
FXMemAttach
MpGetHeapHandle
FXMemDetach
GetModuleHandleI
LoadLibraryExI
FindResourceI
RegDeleteValueI
lstrcatI
GetModuleFileNameI
LoadStringI
MpHeapAlloc
RegEnumKeyExI
lstrcpynI
lstrlenI
RegSetValueExI
RegOpenKeyExI
RegCreateKeyExI
RegQueryValueExI
RegQueryInfoKeyI
lstrcmpiI
RegDeleteKeyI
MPDeleteCriticalSection
MPInitializeCriticalSection
CharNextI
MpHeapFree
UMSEnterCSWraper
GetVersionExI
lstrcpyI
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
EnterCriticalSection
CompareStringW
LCMapStringW
LCMapStringA
CompareStringA
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcessId
GetUserDefaultLCID
TlsFree
TlsGetValue
TlsSetValue
InterlockedExchange
DisableThreadLibraryCalls
IsBadCodePtr
LoadLibraryA
GetProcAddress
LoadResource
SizeofResource
lstrlenA
FreeLibrary
HeapDestroy
GetCurrentProcess
CloseHandle
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
GetLastError
TlsAlloc
RegCloseKey
CoTaskMemFree
CoTaskMemAlloc
CreateBindCtx
CreateFileMoniker
CoCreateFreeThreadedMarshaler
CoCreateInstance
CoTaskMemRealloc
SysStringLen
SysAllocStringLen
VariantInit
VariantClear
SysAllocString
VariantChangeType
LoadRegTypeLi
SetErrorInfo
VarI4FromStr
CreateErrorInfo
RegisterTypeLi
LoadTypeLi
UnRegisterTypeLi
GetErrorInfo
OaBuildVersion
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE