DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b3673bb353214d7504b1b7e7878179c570dbaa6e082d11dd99de335b7d01f29d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3673bb353214d7504b1b7e7878179c570dbaa6e082d11dd99de335b7d01f29d.dll
Resource
win10v2004-20220901-en
Target
b3673bb353214d7504b1b7e7878179c570dbaa6e082d11dd99de335b7d01f29d
Size
236KB
MD5
086781806b83f284255b1e5bb6478460
SHA1
15e3df28785b6868df7b78c84f7a19f1669b831e
SHA256
b3673bb353214d7504b1b7e7878179c570dbaa6e082d11dd99de335b7d01f29d
SHA512
98f054efdfe6133fb600d65e41be8fc429e89849ec903727aee92237a77c0a5946a375b2220f6cf155047578c09cfe810a83d2fc560c6095be46663047496873
SSDEEP
3072:uqYJhHw9V0vUPH8NJB7sY3T09z/bUeHgjDOT4KQlkDZNVf4RGCNVaoB:34sGpwY3T0BUe8KWkDbVVC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
_adjust_fdiv
malloc
free
realloc
wcslen
_purecall
sprintf
_wcsicmp
_ftol
wcscat
memmove
swprintf
_onexit
__dllonexit
_except_handler3
_initterm
LoadLibraryI
PostMessageI
GetWindowsDirectoryI
_LoadVersionedResourceEx@16
??0CReaderWriterLock3@@QAE@XZ
?WriteLock@CReaderWriterLock3@@QAEXXZ
?WriteUnlock@CReaderWriterLock3@@QAEXXZ
?ReadOrWriteLock@CReaderWriterLock3@@QAE_NXZ
?ReadOrWriteUnlock@CReaderWriterLock3@@QAEX_N@Z
??1CReaderWriterLock3@@QAE@XZ
FXMemAttach
MpGetHeapHandle
FXMemDetach
GetModuleHandleI
LoadLibraryExI
FindResourceI
RegDeleteValueI
lstrcatI
GetModuleFileNameI
MpHeapAlloc
LoadStringI
RegEnumKeyExI
lstrcpynI
lstrlenI
RegSetValueExI
RegOpenKeyExI
RegCreateKeyExI
RegQueryValueExI
RegQueryInfoKeyI
lstrcmpiI
RegDeleteKeyI
MPDeleteCriticalSection
MPInitializeCriticalSection
CharNextI
MpHeapFree
UMSEnterCSWraper
GetVersionExI
lstrcpyI
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
EnterCriticalSection
CompareStringW
LCMapStringW
LCMapStringA
CompareStringA
DeleteCriticalSection
InitializeCriticalSection
GetCurrentProcessId
GetUserDefaultLCID
TlsFree
TlsAlloc
TlsGetValue
TlsSetValue
DisableThreadLibraryCalls
IsBadCodePtr
LoadLibraryA
GetProcAddress
LoadResource
SizeofResource
lstrlenA
FreeLibrary
HeapDestroy
GetCurrentProcess
CloseHandle
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
GetLastError
InterlockedExchange
RegCloseKey
CoTaskMemFree
CoTaskMemAlloc
CoCreateFreeThreadedMarshaler
CoCreateInstance
CoTaskMemRealloc
SysStringLen
SysAllocStringLen
VariantInit
VariantClear
VariantCopy
SysAllocString
VariantChangeType
LoadRegTypeLi
SetErrorInfo
VarI4FromStr
CreateErrorInfo
RegisterTypeLi
LoadTypeLi
UnRegisterTypeLi
GetErrorInfo
OaBuildVersion
SafeArrayDestroy
SafeArrayUnlock
SafeArrayCopy
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE