DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7691c21a90e46a52130413a634d6f9187660c9ec84b5eda47c30998e260bbe8d.dll
Resource
win7-20220901-en
Target
7691c21a90e46a52130413a634d6f9187660c9ec84b5eda47c30998e260bbe8d
Size
328KB
MD5
1fa7c1414a684fd13f928a2ef766b6c0
SHA1
1d9174cee993c62088b5feb74093a27cc57238c4
SHA256
7691c21a90e46a52130413a634d6f9187660c9ec84b5eda47c30998e260bbe8d
SHA512
098e5f7b18b1d814fc2492a761761116a1b96bbdef325691d111aa387171e9a2648834e0271b005e89f0ef8f7d2ec6324e4d64efbbb499325e16f58892dd8f43
SSDEEP
6144:008qM+fa7dCKdMF9qLWVHFOTNdTKAm0dNC:008q67dCKdMfqL0HisZ0dNC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DisableThreadLibraryCalls
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
GetShortPathNameA
GetModuleHandleA
lstrlenW
lstrcmpiA
HeapDestroy
CloseHandle
UnmapViewOfFile
ReadFile
CreateFileA
lstrlenA
CreateEventA
GetFileSize
FindClose
FindFirstFileA
GetFileAttributesA
WaitForSingleObject
SetEvent
FreeLibrary
LoadLibraryA
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
InterlockedDecrement
FlushFileBuffers
LocalFree
InterlockedIncrement
FormatMessageA
WideCharToMultiByte
SetLastError
QueryPerformanceFrequency
GetLastError
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
GetCurrentProcess
TlsGetValue
TlsFree
TlsAlloc
Sleep
InterlockedExchange
GetLocalTime
GetCurrentProcessId
GetVersion
GetWindowsDirectoryA
lstrcatA
lstrcpynA
WriteFile
SetFilePointer
CompareStringA
CompareStringW
GetVersionExA
MapViewOfFile
CreateFileMappingA
VirtualQuery
VirtualProtect
SearchPathA
lstrcpyA
ResetEvent
GetTickCount
QueryPerformanceCounter
SystemTimeToFileTime
TerminateProcess
RaiseException
RtlUnwind
CreateThread
GetCurrentThreadId
TlsSetValue
ExitThread
GetCommandLineA
HeapFree
HeapAlloc
ExitProcess
SetUnhandledExceptionFilter
PeekMessageA
MsgWaitForMultipleObjects
TranslateMessage
wsprintfA
LoadStringA
GetDesktopWindow
GetMessageA
DispatchMessageA
CharLowerBuffA
PostThreadMessageA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
RegEnumKeyExA
StringFromCLSID
CoCreateInstance
CLSIDFromProgID
CoGetInterfaceAndReleaseStream
CoUninitialize
CoMarshalInterThreadInterfaceInStream
ProgIDFromCLSID
CoInitialize
CoTaskMemFree
VariantClear
GetErrorInfo
SysStringByteLen
SysAllocStringByteLen
DispGetParam
VariantCopyInd
SafeArrayCreate
SafeArrayGetElement
SafeArrayPutElement
LoadRegTypeLi
CreateErrorInfo
SetErrorInfo
SafeArrayRedim
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysAllocStringLen
SafeArrayDestroy
SysFreeString
SysStringLen
SysReAllocStringLen
VariantChangeType
SysAllocString
VariantCopy
VariantInit
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE