DllGetClassObjectEx
DllQueryInterface
DllUnloadAndFree
Static task
static1
Behavioral task
behavioral1
Sample
cb9301bd017a39b1e1d900c74d8de50621ae7cbc4139774c5816eba16cdbf986.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb9301bd017a39b1e1d900c74d8de50621ae7cbc4139774c5816eba16cdbf986.dll
Resource
win10v2004-20220901-en
Target
cb9301bd017a39b1e1d900c74d8de50621ae7cbc4139774c5816eba16cdbf986
Size
176KB
MD5
82c405b0f99452089154408bbf97dc10
SHA1
9cfeec602569bc912a01dcdba75adf76d163e296
SHA256
cb9301bd017a39b1e1d900c74d8de50621ae7cbc4139774c5816eba16cdbf986
SHA512
ddfbed2288b890d4539e6ada35ad9000113991b5f17a8d532fbf1c143d152690c98d49d4ad358ae7a7166256dfe41a502b0bf93ed3366e750cdb41b3fd20bb2d
SSDEEP
3072:uDD+Kbrdn90SR0Q9zqrePGP90IFwLgjz4qC23b:eD5bxn+SX+PeywLgjzR3b
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
SizeofResource
LockResource
LoadResource
FindResourceExW
SetLastError
FindResourceW
FindClose
GetFullPathNameW
FindFirstFileW
lstrlenW
FindNextFileW
MultiByteToWideChar
IsBadWritePtr
GetLogicalDrives
DisableThreadLibraryCalls
FlushFileBuffers
CloseHandle
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
GetLastError
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringA
WideCharToMultiByte
LCMapStringW
ExitProcess
Sleep
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
LoadLibraryA
GetStringTypeA
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
ShellExecuteW
ord3
ord5
PathIsDirectoryW
PathFileExistsW
UnregisterClassA
DllGetClassObjectEx
DllQueryInterface
DllUnloadAndFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE