DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
cb7d68ac42262fc7a0cd90217cabac85936ffb4c39400a7e341918e962bf879a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb7d68ac42262fc7a0cd90217cabac85936ffb4c39400a7e341918e962bf879a.dll
Resource
win10v2004-20220812-en
Target
cb7d68ac42262fc7a0cd90217cabac85936ffb4c39400a7e341918e962bf879a
Size
73KB
MD5
a1d2fe7f44777732df1b6ac12d70a2a0
SHA1
15bda3ca7a3cacb8cb5239212bbd16455455932a
SHA256
cb7d68ac42262fc7a0cd90217cabac85936ffb4c39400a7e341918e962bf879a
SHA512
246b50b83107d95c4a9da0d95228433cb29752b359982937ef1877204d30a33b406bff9ec4eb92985a935bb351b9886817aaf9595cdc1a4fd92576e4cd6aa6f5
SSDEEP
1536:ZlcIQivr0+EsPA5Cw6i+TV7Hj7qg4vRMoyHwBFthbiG8sSqGwB:ZlvvfEsPA5N6n7Hj+ZvqHHwB/hbi7rwB
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFileType
GetWindowsDirectoryW
CloseHandle
FreeEnvironmentStringsW
IsValidLocale
GetModuleFileNameA
GetStringTypeA
CreateThread
TlsAlloc
FindResourceW
MultiByteToWideChar
GetProcessHeap
GetCurrentThreadId
GetVolumeInformationA
SetStdHandle
GetSystemInfo
DisableThreadLibraryCalls
GetCurrentDirectoryA
GetStringTypeW
GetCurrentProcess
IsWow64Process
ExitProcess
HeapAlloc
lstrcpynA
FormatMessageA
GetLastError
WaitForSingleObject
GetSystemDirectoryW
GetVersionExA
GetCurrentProcessId
WideCharToMultiByte
DoDragDrop
LoadIconA
CallWindowProcW
GetCursorPos
PeekMessageW
CharPrevA
TranslateAcceleratorW
PtInRect
DestroyMenu
DefWindowProcW
DestroyCaret
SetCapture
DrawFocusRect
SysAllocString
VarUI4FromStr
RegSetValueExW
RegQueryInfoKeyW
BitBlt
GetObjectA
CreateEllipticRgn
StartPage
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ