DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
521ca9f92fd53f8fcf73ad0a7fa2f8817ba566a6d0b39f211ee09bea653f515e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
521ca9f92fd53f8fcf73ad0a7fa2f8817ba566a6d0b39f211ee09bea653f515e.dll
Resource
win10v2004-20221111-en
Target
521ca9f92fd53f8fcf73ad0a7fa2f8817ba566a6d0b39f211ee09bea653f515e
Size
264KB
MD5
3beba5b144001b9c27c6b350b7b2cc20
SHA1
971434a57bbd6debc8c1a99cb5473c9d7214a495
SHA256
521ca9f92fd53f8fcf73ad0a7fa2f8817ba566a6d0b39f211ee09bea653f515e
SHA512
f3d00e6ef19b0026c77c519f1835d374ed2bbb00f508f2ed73a325094c36c93c5d7e944e9ebc04432a94cb32ad96a4473c3cd665113aa5464bd3433566a09ffe
SSDEEP
3072:ys4RMdUOg+uzkgRRW7n4d5lNv2N4H2wlXyKg1gu8zin3uSTH0oaAi6qHo/+:PUOg+uET47+N4Ps6u8UH68qW+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord380
ord3270
ord2702
ord2706
ord5493
ord5410
ord462
ord1980
ord1296
ord2325
ord5221
ord911
ord907
ord3934
ord784
ord1624
ord6703
ord1209
ord1177
ord1175
ord1201
ord1120
ord1167
ord371
ord1098
ord1208
ord1206
ord1092
ord1037
ord1084
ord315
ord765
ord299
ord6118
ord2902
ord876
ord1489
ord581
ord762
ord265
ord1917
ord2248
ord314
ord1049
ord3830
ord266
ord6754
ord1191
ord1185
ord1187
ord757
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord3683
ord310
ord578
ord3907
ord764
__clean_type_info_names_internal
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
_except_handler4_common
fopen
fclose
strcpy
_ltoa
strcat
atoi
_CxxThrowException
_recalloc
_purecall
_resetstkoflw
memset
strcat_s
wcsncpy_s
strcpy_s
memcpy_s
free
malloc
_mbsnbcpy_s
memcmp
__CxxFrameHandler3
InterlockedExchange
CreateFileA
GetFileSize
ReadFile
CloseHandle
GetTempPathA
GetTickCount
CopyFileA
DeleteFileA
lstrcpyA
Sleep
GetModuleHandleA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
IsDBCSLeadByte
GetModuleFileNameA
InterlockedDecrement
InterlockedIncrement
lstrcmpiA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcessHeap
HeapFree
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
LocalFree
LocalAlloc
lstrlenA
TerminateProcess
InterlockedCompareExchange
CharNextA
UnregisterClassA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
StringFromGUID2
OleRun
CLSIDFromProgID
VariantInit
SysAllocStringByteLen
SysStringByteLen
SafeArrayGetElement
SysAllocStringLen
VarBstrCat
VariantClear
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
GetErrorInfo
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE