DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d5d9eff20e61eabd5f640555e0213bc6482249c3efa0a792149a868cfd363c4c.dll
Resource
win7-20220812-en
Target
d5d9eff20e61eabd5f640555e0213bc6482249c3efa0a792149a868cfd363c4c
Size
148KB
MD5
96c75da371c98e51e9c07191d33bd7c0
SHA1
d86bfa8ef8cabcd774f2b1c6499222ceb547f2fb
SHA256
d5d9eff20e61eabd5f640555e0213bc6482249c3efa0a792149a868cfd363c4c
SHA512
04e15375ed1962e6f15bff620e7362cc4971247d8b99376ce9e33ccf872f8cb7bb88a00a5270b45556d236ce1f356894b7eba4a65993a61666ea94d842f3948a
SSDEEP
3072:VsmH7iXeUWcyuVkLXkOtI3G1vgSFu1o8qRUl+QImQoqpjf:/SeUWcyuVkL0y1vFFu10q+Nm9gf
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InternetCrackUrlA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrlenA
lstrcmpiA
DisableThreadLibraryCalls
lstrcpynA
lstrcpyA
GetModuleFileNameA
lstrcatA
IsDBCSLeadByte
InterlockedIncrement
InterlockedDecrement
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
LockResource
GetLocaleInfoA
GetProcAddress
LoadLibraryA
IsBadWritePtr
lstrcmpA
CloseHandle
CreateProcessA
GetVersion
CompareStringA
CompareStringW
WritePrivateProfileStringA
GetWindowsDirectoryA
GetShortPathNameA
GetStringTypeA
LCMapStringW
LCMapStringA
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetACP
InterlockedExchange
GetStringTypeW
SetEnvironmentVariableA
FindResourceExA
FlushFileBuffers
GetEnvironmentStrings
SetStdHandle
SetFilePointer
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCPInfo
GetOEMCP
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetCurrentThreadId
GetCommandLineA
HeapCreate
VirtualFree
TerminateProcess
GetCurrentProcess
RtlUnwind
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
CharLowerA
CharNextA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
SysAllocString
LoadTypeLi
UnRegisterTypeLi
SysStringLen
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
SysFreeString
SHGetValueA
SHSetValueA
PathFindExtensionA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE