DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
acc996f986b322f4398a229af87b3270a58f1179c329eb87448ac1ef05a276c4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acc996f986b322f4398a229af87b3270a58f1179c329eb87448ac1ef05a276c4.dll
Resource
win10v2004-20220901-en
Target
acc996f986b322f4398a229af87b3270a58f1179c329eb87448ac1ef05a276c4
Size
520KB
MD5
71a3aa26ff7f634eda7004887a4289db
SHA1
1a9a55335c885b4d2d62b4f341aa81b81072255c
SHA256
acc996f986b322f4398a229af87b3270a58f1179c329eb87448ac1ef05a276c4
SHA512
831a2dbe1c6dd3beb2228dff3d0cb07e3e9527450ef040e15e22e3b236c881b9f2c97ea654ada268f2a545017a91ebe6bebca5b4f7967893d869249873c018bd
SSDEEP
12288:SqBeXpM00D+gq/rn0IOUlosL03/Ec8B+XLEqIeX6gAy/e:3e5M00D+gq/YUl3oPVXMeBAGe
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
timeSetEvent
timeGetTime
ord597
ord571
ord585
ord587
ord24
ord17
ord37
ord45
SetEndOfFile
VirtualProtect
SetConsoleCtrlHandler
WaitForSingleObject
ResetEvent
SetEvent
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExW
RaiseException
GetLastError
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
MultiByteToWideChar
ReleaseMutex
WideCharToMultiByte
lstrlenW
lstrlenA
Sleep
GetTempFileNameW
GetTempPathW
OutputDebugStringW
CreateThread
CreateMutexW
CreateEventW
CloseHandle
DeleteFileW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
SetFilePointer
CreateFileW
FlushFileBuffers
OutputDebugStringA
WriteFile
GetDateFormatA
GetSystemTime
FindClose
FindFirstFileW
GetTimeZoneInformation
ReleaseSemaphore
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedIncrement
FreeLibrary
InterlockedDecrement
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcpyW
lstrcpynW
lstrcmpW
lstrcmpiW
GetCurrentThreadId
SetThreadPriority
GetThreadPriority
GetCurrentThread
GetTickCount
GetSystemInfo
VirtualFree
DuplicateHandle
GetCurrentProcess
VirtualAlloc
GetModuleFileNameA
DisableThreadLibraryCalls
FindNextFileA
FindFirstFileA
GetStringTypeA
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetLocaleInfoW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
CreateDirectoryA
GetFullPathNameA
GetCurrentDirectoryA
CreateSemaphoreW
SetCurrentDirectoryA
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTimeFormatA
VirtualQuery
TerminateProcess
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
GetModuleHandleA
TlsGetValue
TlsSetValue
SetStdHandle
LoadLibraryA
GetVersion
CreateFileA
ReadFile
CreateEventA
DeviceIoControl
RtlUnwind
GetCommandLineA
ExitProcess
HeapCreate
FatalAppExitA
IsBadWritePtr
TlsAlloc
SetLastError
TlsFree
GetStringTypeW
GetQueueStatus
PostThreadMessageW
wsprintfW
wvsprintfW
MsgWaitForMultipleObjects
UnregisterClassA
PeekMessageW
DispatchMessageW
PostQuitMessage
UnregisterClassW
CharUpperBuffW
RegisterWindowMessageW
RegSetValueW
RegOpenKeyExW
RegEnumKeyExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegCreateKeyW
CoFreeUnusedLibraries
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CoGetMalloc
StringFromGUID2
SysFreeString
SysAllocStringLen
SysStringByteLen
SysStringLen
SafeArrayCreate
SafeArrayPutElement
SysAllocString
StrNCatW
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE