DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3bad5a414cf5af5cb4fe29d735cd56d7b2dd1993f3eea252504dc7b7f4fff93d.dll
Resource
win7-20220901-en
Target
3bad5a414cf5af5cb4fe29d735cd56d7b2dd1993f3eea252504dc7b7f4fff93d
Size
507KB
MD5
30ceb83e1b62ba4d84b7648d753f06f0
SHA1
0ee4435a8a4a9ab74fcdd3c5b746fdf53420491b
SHA256
3bad5a414cf5af5cb4fe29d735cd56d7b2dd1993f3eea252504dc7b7f4fff93d
SHA512
fa50b76433cd671c5985d3880fff5246ccbb0bca78f29c385f19682e56e3b94c93b8427f00ec67aacc85a4aaad4bdd614eca3ac00176358fdb1af526a8aa6d6c
SSDEEP
12288:NcphQxm7fJNxGzx+mrIZIhFChHkkcjWjAlZRHT7TrOxcucYPNt:gQxm7fJNxGzAmrZhMkkcCmRH3Tr+cuR3
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ResetEvent
CreateSemaphoreW
CreateEventW
GetSystemInfo
QueryPerformanceFrequency
DeleteCriticalSection
ReleaseMutex
CloseHandle
GetModuleFileNameW
WideCharToMultiByte
lstrlenW
GetTimeZoneInformation
SetEnvironmentVariableA
LeaveCriticalSection
GetProcessTimes
InitializeCriticalSection
SetEvent
WaitForSingleObject
EnterCriticalSection
GetCurrentProcess
TryEnterCriticalSection
K32GetProcessMemoryInfo
CreateMutexW
InterlockedDecrement
CompareStringW
SetCurrentDirectoryW
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
QueryPerformanceCounter
ReleaseSemaphore
InterlockedIncrement
CreateToolhelp32Snapshot
Module32First
Module32Next
VirtualQuery
VirtualFree
VirtualAlloc
GetCurrentThreadId
DecodePointer
GetCommandLineA
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
EncodePointer
ExitThread
CreateThread
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThread
GetProcAddress
Sleep
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
WriteFile
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FatalAppExitA
HeapSize
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
SetStdHandle
WriteConsoleW
MultiByteToWideChar
SetFilePointer
CreateFileW
LCMapStringW
GetStringTypeW
SetEndOfFile
GetProcessHeap
ReadFile
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LocalFree
SwitchToThread
SetErrorMode
VirtualUnlock
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
FormatMessageA
CreateFileA
DeviceIoControl
CreateSemaphoreA
GetDriveTypeW
WindowFromPoint
RegCreateKeyExW
RegEnumKeyExW
RegSetValueW
RegCreateKeyW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
RegEnumValueW
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
SetErrorInfo
SysFreeString
CreateErrorInfo
VariantChangeType
GetErrorInfo
VariantClear
VariantInit
SysStringByteLen
PathRemoveFileSpecW
MFCreateAttributes
MFCreateEventQueue
MFCreateMediaEvent
MFCreateMediaType
MFTUnregister
MFTRegister
MFCreateMemoryBuffer
Direct3DCreate9
DXVA2CreateDirect3DDeviceManager9
PSCreateMemoryPropertyStore
MFCreateVideoSampleFromSurface
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE