DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
002970d619d450a1f286f617fac2ef043f29a664ad4d1a1f691400c472543ed4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
002970d619d450a1f286f617fac2ef043f29a664ad4d1a1f691400c472543ed4.dll
Resource
win10v2004-20220901-en
Target
002970d619d450a1f286f617fac2ef043f29a664ad4d1a1f691400c472543ed4
Size
160KB
MD5
2a9fae0362098d4f26db4365fa2a9b00
SHA1
b32aef88c1ca73be6b096400d5d87446b0040436
SHA256
002970d619d450a1f286f617fac2ef043f29a664ad4d1a1f691400c472543ed4
SHA512
aed6378440dd7d9742f68e0a75c16c96546e9fba96149ab30fef81e60153b1c2f4a8882d3f2ecfbe3505ad78d9d696f3e1e9a1c84cc8997a92549b48a868235d
SSDEEP
1536:ZBlgvpNZKhlAcxthaJpFSNwhiLFqiM+IZq4yIhWSWEt8U2hRgrcSNF9NOdglG:7lgBDKdxEpFSVJqrZqeWnEqvgrcSNlG
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__dllonexit
malloc
free
realloc
wcslen
_purecall
_wcsicmp
wcscmp
wcscat
memmove
_wcsnicmp
swprintf
wcschr
wcscpy
_wtol
sprintf
_onexit
_except_handler3
_adjust_fdiv
_initterm
LoadLibraryI
PostMessageI
GetWindowsDirectoryI
_LoadVersionedResourceEx@16
??1CReaderWriterLock3@@QAE@XZ
??0CReaderWriterLock3@@QAE@XZ
?WriteLock@CReaderWriterLock3@@QAEXXZ
?WriteUnlock@CReaderWriterLock3@@QAEXXZ
?ReadOrWriteLock@CReaderWriterLock3@@QAE_NXZ
?ReadOrWriteUnlock@CReaderWriterLock3@@QAEX_N@Z
FXMemAttach
MpGetHeapHandle
FXMemDetach
GetModuleHandleI
LoadLibraryExI
FindResourceI
RegDeleteValueI
lstrcatI
GetModuleFileNameI
LoadStringI
MpHeapAlloc
RegEnumKeyExI
lstrcpynI
lstrlenI
RegSetValueExI
RegOpenKeyExI
RegCreateKeyExI
RegQueryValueExI
RegQueryInfoKeyI
lstrcmpiI
RegDeleteKeyI
MPDeleteCriticalSection
MPInitializeCriticalSection
CharNextI
MpHeapFree
UMSEnterCSWraper
GetVersionExI
lstrcpyI
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
EnterCriticalSection
CompareStringW
LCMapStringW
LCMapStringA
CompareStringA
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcessId
GetUserDefaultLCID
TlsFree
TlsGetValue
TlsSetValue
InterlockedExchange
DisableThreadLibraryCalls
IsBadCodePtr
LoadLibraryA
GetProcAddress
LoadResource
SizeofResource
lstrlenA
FreeLibrary
HeapDestroy
GetCurrentProcess
CloseHandle
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
GetLastError
TlsAlloc
RegCloseKey
CoTaskMemFree
CoTaskMemAlloc
CreateBindCtx
CreateFileMoniker
CoCreateFreeThreadedMarshaler
CoCreateInstance
CoTaskMemRealloc
SysStringLen
SysAllocStringLen
VariantInit
VariantClear
SysAllocString
VariantChangeType
LoadRegTypeLi
SetErrorInfo
VarI4FromStr
CreateErrorInfo
RegisterTypeLi
LoadTypeLi
UnRegisterTypeLi
GetErrorInfo
OaBuildVersion
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE