CreateCompilerFactory
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
InMemoryCompile
VSDllRegisterServer
VSDllUnregisterServer
_GetMessageDll@0
Static task
static1
Behavioral task
behavioral1
Sample
6b70bad23800f1514e8ddd8f44c7f44c5c35a00389ab480763fc4d26dc52c7b5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b70bad23800f1514e8ddd8f44c7f44c5c35a00389ab480763fc4d26dc52c7b5.dll
Resource
win10v2004-20220812-en
Target
6b70bad23800f1514e8ddd8f44c7f44c5c35a00389ab480763fc4d26dc52c7b5
Size
704KB
MD5
4dbc3792b9f64beb0f6aa9dea74d7ca0
SHA1
12f7ba096e5b7ee8f95a8b5228ff045fdcb18927
SHA256
6b70bad23800f1514e8ddd8f44c7f44c5c35a00389ab480763fc4d26dc52c7b5
SHA512
a18e21bdba395f3b1a9cfb7560669abb19820ca860480db68e900885d3ecadb762ff317d145f43597a831dc8e6743a2abca82ffa8b06d3004dd149ca317a4e9f
SSDEEP
12288:ZRNIvF1gxNTNgsyyu9ed/yX6lBXh3hUJ25DXwE9u1heaSEqCBCVFmi:ZROvDgxVNgsyyu9edLlBXh3eo5rhehJM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
GetCurrentProcessId
LocalAlloc
GetTickCount
ExitProcess
GetCurrentDirectoryW
CreateFileW
CreateFileA
GetFileAttributesW
GetFileAttributesA
DeleteFileW
DeleteFileA
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
GetFullPathNameW
GetFullPathNameA
FindFirstFileW
FindFirstFileA
QueryPerformanceFrequency
QueryPerformanceCounter
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
GetSystemInfo
VirtualFree
VirtualAlloc
lstrlenW
GetProcessHeap
SizeofResource
LockResource
LoadResource
FindResourceA
GetLastError
WriteFile
CloseHandle
MultiByteToWideChar
LoadLibraryA
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SearchPathA
WideCharToMultiByte
GetOEMCP
AreFileApisANSI
SearchPathW
FreeLibrary
GetProcAddress
GlobalUnlock
GlobalSize
GlobalLock
GetCurrentDirectoryA
Sleep
InterlockedIncrement
InterlockedDecrement
RaiseException
FormatMessageW
FormatMessageA
lstrlenA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
LoadLibraryExA
lstrcatA
GetFileTime
GetCurrentThreadId
GetSystemTimeAsFileTime
DeleteCriticalSection
GetFileSize
MoveFileA
MoveFileW
ReadFile
MoveFileExW
InterlockedCompareExchange
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetSystemDefaultLangID
GetUserDefaultLangID
lstrcpyA
DisableThreadLibraryCalls
GetCurrentProcess
GetModuleHandleA
FindClose
fwrite
_putw
fseek
fread
_getw
_wcsicmp
fclose
_fdopen
_open_osfhandle
isxdigit
bsearch
_wtoi
swscanf
_wcsnicmp
_finite
_local_unwind2
_snprintf
fprintf
wcsncmp
qsort
_CIfmod
sprintf
_splitpath
realloc
??_U@YAPAXI@Z
free
malloc
wcsncpy
memmove
??2@YAPAXI@Z
_iob
wcschr
printf
_wgetenv
wcstoul
_except_handler3
wcstok
strrchr
wcsrchr
wcscat
wcsstr
_wsplitpath
_initterm
_adjust_fdiv
__security_error_handler
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__dllonexit
_onexit
memset
wcspbrk
swprintf
__CxxFrameHandler
_purecall
_CxxThrowException
??3@YAXPAX@Z
??_V@YAXPAX@Z
wcscpy
wcslen
wcscmp
CoGetMalloc
CoInitializeEx
CoUninitialize
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CreateStreamOnHGlobal
GetHGlobalFromStream
CoCreateInstance
VarDecDiv
VarDecCmp
VarDecNeg
VarDecMul
SysFreeString
SysAllocString
SysStringLen
SysAllocStringLen
VariantInit
VariantClear
VariantChangeType
SetErrorInfo
SysAllocStringByteLen
SysStringByteLen
GetErrorInfo
VarUI4FromStr
VarR8FromDec
VarR4FromDec
VarDecFix
VarUI4FromDec
VarI4FromDec
VarUI2FromDec
VarI2FromDec
VarUI1FromDec
VarI1FromDec
VarDecFromR8
VarDecFromR4
VarDecFromUI4
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
VarR8FromStr
VarDecAdd
VarDecSu
VarDecFromI4
PathIsURLW
PathIsRelativeW
PathFindExtensionA
LoadStringW
LoadStringA
CharNextA
PeekMessageA
CreateCompilerFactory
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
InMemoryCompile
VSDllRegisterServer
VSDllUnregisterServer
_GetMessageDll@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE