DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c1d809f0b81484e77d7c467d17c1f4fd2852a2a76e473724e901325121dafe70.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1d809f0b81484e77d7c467d17c1f4fd2852a2a76e473724e901325121dafe70.dll
Resource
win10v2004-20220812-en
Target
c1d809f0b81484e77d7c467d17c1f4fd2852a2a76e473724e901325121dafe70
Size
207KB
MD5
0c46a100889135167873178fb452d2e0
SHA1
e222b32f86a1c4c7a9b9decb0d15c4dadc144ab9
SHA256
c1d809f0b81484e77d7c467d17c1f4fd2852a2a76e473724e901325121dafe70
SHA512
b0cba5518ea9a8f5a536ca5d8a14e80ef18808e8bc946829f9cba97a22a2862414e98d4101d09fb9f2aab8d107be5e5012da0c14fcb427cd1e2670c3defd3b7c
SSDEEP
3072:fmFwmUxPSZSXLCc1P8dIniV2kpnaJhCP1hUENneDpPmjBQOKrvmHYtzpNJueUC:OFWg81P8dIniIOnazAxtFQRpDuG
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrcmpiW
GetModuleHandleA
GetProcAddress
GetThreadLocale
GetLastError
SetThreadLocale
lstrlenW
GetModuleFileNameW
GetModuleHandleW
LoadLibraryExW
FreeLibrary
DeleteCriticalSection
LockResource
EnterCriticalSection
RaiseException
MultiByteToWideChar
GetFileAttributesW
LeaveCriticalSection
SizeofResource
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LoadResource
FindResourceW
FindResourceExW
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
lstrlenA
OutputDebugStringA
GetTickCount
CloseHandle
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
VirtualAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringW
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
LoadLibraryA
LCMapStringA
GetStringTypeA
GetStringTypeW
VirtualQuery
CharNextW
RegOpenKeyExW
CryptGetHashParam
CryptAcquireContextW
CryptReleaseContext
CryptCreateHash
CryptDestroyHash
CryptHashData
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegQueryValueExW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
CoCreateInstance
CoTaskMemAlloc
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
VariantInit
SysAllocStringLen
SafeArrayUnaccessData
VarUI4FromStr
SysFreeString
VariantChangeType
SafeArrayCreate
SafeArrayDestroy
SafeArrayAccessData
VariantClear
Utf8ToUtf16
RpcStringFreeA
UuidToStringA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE