DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
020e9ec0e09fe9018283caa3330344e2addbab379459c176719241176ab2db50.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
020e9ec0e09fe9018283caa3330344e2addbab379459c176719241176ab2db50.dll
Resource
win10v2004-20220812-en
Target
020e9ec0e09fe9018283caa3330344e2addbab379459c176719241176ab2db50
Size
376KB
MD5
96c78702784dd23771b9aafa059c5790
SHA1
c31d1d05deb28b93e557df9af3ae560eb2b71a14
SHA256
020e9ec0e09fe9018283caa3330344e2addbab379459c176719241176ab2db50
SHA512
b087891e01ec5ed985200850c137d70666828bc7e1b76b13d1059e1c66e59e946f281092b56415e9de2613efa85a146e0104cea028ef30ccda94129201842087
SSDEEP
6144:/08qM+fa7dCKdMF9qLWVHFOTNdTtyvE9pbLohozsXme3c8:/08q67dCKdMfqL0HivyvQqhDXHF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DisableThreadLibraryCalls
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
GetShortPathNameA
GetModuleHandleA
lstrlenW
lstrcmpiA
HeapDestroy
CloseHandle
UnmapViewOfFile
ReadFile
CreateFileA
lstrlenA
CreateEventA
GetFileSize
FindClose
FindFirstFileA
GetFileAttributesA
WaitForSingleObject
SetEvent
FreeLibrary
LoadLibraryA
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
InterlockedDecrement
FlushFileBuffers
LocalFree
InterlockedIncrement
FormatMessageA
WideCharToMultiByte
SetLastError
QueryPerformanceFrequency
GetLastError
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
GetCurrentProcess
TlsGetValue
TlsFree
TlsAlloc
Sleep
InterlockedExchange
GetLocalTime
GetCurrentProcessId
GetVersion
GetWindowsDirectoryA
lstrcatA
lstrcpynA
WriteFile
SetFilePointer
CompareStringA
CompareStringW
GetVersionExA
MapViewOfFile
CreateFileMappingA
VirtualQuery
VirtualProtect
SearchPathA
lstrcpyA
ResetEvent
GetTickCount
QueryPerformanceCounter
SystemTimeToFileTime
TerminateProcess
RaiseException
RtlUnwind
CreateThread
GetCurrentThreadId
TlsSetValue
ExitThread
GetCommandLineA
HeapFree
HeapAlloc
ExitProcess
SetUnhandledExceptionFilter
PeekMessageA
MsgWaitForMultipleObjects
TranslateMessage
wsprintfA
LoadStringA
GetDesktopWindow
GetMessageA
DispatchMessageA
CharLowerBuffA
PostThreadMessageA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
RegEnumKeyExA
StringFromCLSID
CoCreateInstance
CLSIDFromProgID
CoGetInterfaceAndReleaseStream
CoUninitialize
CoMarshalInterThreadInterfaceInStream
ProgIDFromCLSID
CoInitialize
CoTaskMemFree
VariantClear
GetErrorInfo
SysStringByteLen
SysAllocStringByteLen
DispGetParam
VariantCopyInd
SafeArrayCreate
SafeArrayGetElement
SafeArrayPutElement
LoadRegTypeLi
CreateErrorInfo
SetErrorInfo
SafeArrayRedim
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysAllocStringLen
SafeArrayDestroy
SysFreeString
SysStringLen
SysReAllocStringLen
VariantChangeType
SysAllocString
VariantCopy
VariantInit
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE