DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f1e679eb3bfbdcdf9812d1dcfe87c7b9d3c3536b18a00187313f7b94de9f6fa7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1e679eb3bfbdcdf9812d1dcfe87c7b9d3c3536b18a00187313f7b94de9f6fa7.dll
Resource
win10v2004-20220812-en
Target
f1e679eb3bfbdcdf9812d1dcfe87c7b9d3c3536b18a00187313f7b94de9f6fa7
Size
324KB
MD5
90b6f638aed8ac6a19994bfe2badd990
SHA1
6443e75dc28124672483245ff9cdab64b8d665bb
SHA256
f1e679eb3bfbdcdf9812d1dcfe87c7b9d3c3536b18a00187313f7b94de9f6fa7
SHA512
838915f674d3f75089742d8a5e93059340f58f8da34a703eb8ebae0881736286d2764b3fdc61f6f7389cecdce343a2e4936dcec2c0db6cc5d2b9aa0e71ae78a6
SSDEEP
6144:nJGHrEMy/pNaLdLHoDaTBqcVAOiHL/z2nK:nJG1LdLH5TscVIb2K
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord2
ord3
ord4
ord5
LoadLibraryExA
GetModuleHandleA
GlobalFree
GlobalAlloc
CloseHandle
ReadFile
FindResourceA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
LoadResource
SizeofResource
FreeLibrary
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcatA
GetModuleFileNameA
lstrcpyA
lstrcpynA
lstrcmpiA
lstrlenA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
WriteFile
SetStdHandle
SetFilePointer
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCurrentProcess
TerminateProcess
GetProcAddress
GetOEMCP
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
FlushFileBuffers
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapSize
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
HeapReAlloc
GetCurrentThreadId
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
ReleaseDC
DestroyCursor
GetDC
CharNextA
CreateIconIndirect
CreateCompatibleBitmap
SetDIBits
DeleteObject
CreateBitmap
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
CoTaskMemFree
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VarUI4FromStr
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_CountRefs
NdrDllUnregisterProxy
NdrDllRegisterProxy
NdrCStdStubBuffer_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrOleAllocate
NdrOleFree
IUnknown_QueryInterface_Proxy
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
CStdStubBuffer_QueryInterface
CStdStubBuffer_AddRef
CStdStubBuffer_Connect
CStdStubBuffer_Disconnect
CStdStubBuffer_Invoke
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_DebugServerRelease
PathFindExtensionA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE