DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ac23f42f359f23e38b6ccb5039ec3eb1acffa346b037762206a60a7bfc7cfee8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac23f42f359f23e38b6ccb5039ec3eb1acffa346b037762206a60a7bfc7cfee8.dll
Resource
win10v2004-20220901-en
Target
ac23f42f359f23e38b6ccb5039ec3eb1acffa346b037762206a60a7bfc7cfee8
Size
308KB
MD5
0ccba112fa2afb09848547c1518707a0
SHA1
fc1e3d12f368e09415a00f3a2f9ea3e1c1524325
SHA256
ac23f42f359f23e38b6ccb5039ec3eb1acffa346b037762206a60a7bfc7cfee8
SHA512
9143f9f53d5c3de597789bd78dd72c562de286836be2b85708d153793f50a5b48c73598047fc54f5f15c4ae156ddc1ca3b7ec8d6890527243f9c619d2cc61d45
SSDEEP
6144:nJGHrEMy/pNaLdLHoDaTBqcVAOiHSACXWVi:nJG1LdLH5TscVTJXWV
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord2
ord3
ord4
ord5
LoadLibraryExA
GetModuleHandleA
GlobalFree
GlobalAlloc
CloseHandle
ReadFile
FindResourceA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
LoadResource
SizeofResource
FreeLibrary
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcatA
GetModuleFileNameA
lstrcpyA
lstrcpynA
lstrcmpiA
lstrlenA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
WriteFile
SetStdHandle
SetFilePointer
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCurrentProcess
TerminateProcess
GetProcAddress
GetOEMCP
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
FlushFileBuffers
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapSize
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
HeapReAlloc
GetCurrentThreadId
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
ReleaseDC
DestroyCursor
GetDC
CharNextA
CreateIconIndirect
CreateCompatibleBitmap
SetDIBits
DeleteObject
CreateBitmap
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
CoTaskMemFree
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VarUI4FromStr
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_CountRefs
NdrDllUnregisterProxy
NdrDllRegisterProxy
NdrCStdStubBuffer_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrOleAllocate
NdrOleFree
IUnknown_QueryInterface_Proxy
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
CStdStubBuffer_QueryInterface
CStdStubBuffer_AddRef
CStdStubBuffer_Connect
CStdStubBuffer_Disconnect
CStdStubBuffer_Invoke
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_DebugServerRelease
PathFindExtensionA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE