DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6c1b4577e0cc544f3b3e3646607e6b10e712d2dc2252b847a1a1561f8d50af20.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6c1b4577e0cc544f3b3e3646607e6b10e712d2dc2252b847a1a1561f8d50af20.dll
Resource
win10v2004-20220901-en
Target
6c1b4577e0cc544f3b3e3646607e6b10e712d2dc2252b847a1a1561f8d50af20
Size
172KB
MD5
4dc4cc281083ee58930a0073bf812f00
SHA1
0317cb0fad2b2f94a270e79a4ece264f095c953a
SHA256
6c1b4577e0cc544f3b3e3646607e6b10e712d2dc2252b847a1a1561f8d50af20
SHA512
4fc24e42328558af08c1c45fe104f9b59c4e0c2014740ffaa5d8e7248a85e1a5134ed9852c494ec9c0a316a2533c0d6121ae87b00b6c8f284ea1dd85e03b0cfb
SSDEEP
3072:6cwR7Tht0n214yWSDpdq+0ubyFMlHj6gxIfDn:hWht0n26yWks8bIuD6gyn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
__dllonexit
malloc
free
realloc
wcslen
_purecall
_wcsicmp
wcscmp
wcscat
memmove
_wcsnicmp
swprintf
wcschr
wcscpy
_wtol
sprintf
_onexit
_except_handler3
_adjust_fdiv
_initterm
LoadLibraryI
PostMessageI
GetWindowsDirectoryI
_LoadVersionedResourceEx@16
??1CReaderWriterLock3@@QAE@XZ
??0CReaderWriterLock3@@QAE@XZ
?WriteLock@CReaderWriterLock3@@QAEXXZ
?WriteUnlock@CReaderWriterLock3@@QAEXXZ
?ReadOrWriteLock@CReaderWriterLock3@@QAE_NXZ
?ReadOrWriteUnlock@CReaderWriterLock3@@QAEX_N@Z
FXMemAttach
MpGetHeapHandle
FXMemDetach
GetModuleHandleI
LoadLibraryExI
FindResourceI
RegDeleteValueI
lstrcatI
GetModuleFileNameI
LoadStringI
MpHeapAlloc
RegEnumKeyExI
lstrcpynI
lstrlenI
RegSetValueExI
RegOpenKeyExI
RegCreateKeyExI
RegQueryValueExI
RegQueryInfoKeyI
lstrcmpiI
RegDeleteKeyI
MPDeleteCriticalSection
MPInitializeCriticalSection
CharNextI
MpHeapFree
UMSEnterCSWraper
GetVersionExI
lstrcpyI
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
EnterCriticalSection
CompareStringW
LCMapStringW
LCMapStringA
CompareStringA
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcessId
GetUserDefaultLCID
TlsFree
TlsGetValue
TlsSetValue
InterlockedExchange
DisableThreadLibraryCalls
IsBadCodePtr
LoadLibraryA
GetProcAddress
LoadResource
SizeofResource
lstrlenA
FreeLibrary
HeapDestroy
GetCurrentProcess
CloseHandle
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
GetLastError
TlsAlloc
RegCloseKey
CoTaskMemFree
CoTaskMemAlloc
CreateBindCtx
CreateFileMoniker
CoCreateFreeThreadedMarshaler
CoCreateInstance
CoTaskMemRealloc
SysStringLen
SysAllocStringLen
VariantInit
VariantClear
SysAllocString
VariantChangeType
LoadRegTypeLi
SetErrorInfo
VarI4FromStr
CreateErrorInfo
RegisterTypeLi
LoadTypeLi
UnRegisterTypeLi
GetErrorInfo
OaBuildVersion
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE