DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c129f723b3f2e50bc41fbd6bd7a6bd724ce96654dd12d127f7c290803b9c34aa.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c129f723b3f2e50bc41fbd6bd7a6bd724ce96654dd12d127f7c290803b9c34aa.dll
Resource
win10v2004-20221111-en
Target
c129f723b3f2e50bc41fbd6bd7a6bd724ce96654dd12d127f7c290803b9c34aa
Size
304KB
MD5
2865bdbe01032993beb83ecccaac9270
SHA1
eba3e2d82045318a224e52fcca80d5f6e3cf0d41
SHA256
c129f723b3f2e50bc41fbd6bd7a6bd724ce96654dd12d127f7c290803b9c34aa
SHA512
8814f7871323da7cd5543faef77d065bfc9a12241d191f842f7153494947e7e793a22595f8a58ae09dd10c73c88cdb73e3b01856c6393c5cca93dfcc02b8532a
SSDEEP
6144:IkO1SmEhl5NtGlJVD3fCUfiHaBUS/gwhZOodp84vLZUe8:If1xAaqOdyr
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord204
SetupDiOpenClassRegKey
TAPASLink
ord5261
ord1727
ord5065
ord2446
ord5277
ord2982
ord3147
ord2124
ord3259
ord3136
ord3262
ord2985
ord3081
ord2976
ord3370
ord3830
ord4465
ord3825
ord3079
ord3831
ord4627
ord4424
ord3640
ord609
ord693
ord768
ord567
ord489
ord2302
ord4258
ord6656
ord4710
ord2642
ord2864
ord6028
ord4080
ord6905
ord6007
ord3998
ord3286
ord6907
ord5981
ord3753
ord4377
ord816
ord2862
ord3996
ord2096
ord384
ord562
ord4224
ord1908
ord4715
ord1690
ord5288
ord4439
ord2054
ord4431
ord771
ord5849
ord497
ord939
ord2817
ord1008
ord4259
ord3721
ord2411
ord2023
ord4218
ord2578
ord4398
ord6740
ord3301
ord795
ord2301
ord2298
ord2358
ord2370
ord6334
ord3571
ord3663
ord2055
ord3749
ord2414
ord470
ord4854
ord6215
ord6199
ord6784
ord2408
ord1641
ord1146
ord4274
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord3953
ord1168
ord1193
ord2725
ord1131
ord3610
ord656
ord4275
ord535
ord2763
ord3874
ord2379
ord1148
ord3582
ord616
ord6242
ord2299
ord3317
ord5430
ord4376
ord5280
ord3597
ord3716
ord790
ord324
ord6646
ord4234
ord4853
ord6111
ord861
ord6874
ord2784
ord5953
ord3092
ord2915
ord858
ord2818
ord539
ord537
ord860
ord2514
ord641
ord6467
ord540
ord4160
ord2528
ord800
ord823
ord825
ord6376
ord4837
ord2648
ord4441
ord4353
ord3798
ord5290
ord2385
ord6374
ord5163
ord1776
ord5241
ord4402
ord2582
ord4078
ord6055
ord4396
ord3574
ord3402
ord4835
ord2575
ord4425
ord1775
ord5287
ord4407
ord5265
ord6052
ord4998
ord4976
ord4358
ord4948
ord5160
ord4742
ord4905
ord1907
ord5162
ord5161
ord3626
ord924
ord755
ord6502
ord269
ord1176
ord1575
ord1577
ord1182
ord342
ord1116
ord1243
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord1197
_ftol
realloc
malloc
free
_mbsicmp
_CxxThrowException
_purecall
strlen
atoi
strcat
strcpy
memcmp
strcmp
wcscpy
memset
memcpy
__dllonexit
__CxxFrameHandler
_mbscmp
sscanf
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_EH_prolog
_stricmp
HeapDestroy
lstrcmpiA
LoadLibraryExA
lstrcpynA
FindResourceA
LoadResource
GetLastError
FreeLibrary
GetShortPathNameA
SizeofResource
InterlockedIncrement
GetModuleFileNameA
InterlockedDecrement
GetSystemDefaultLangID
lstrcatA
GetFullPathNameA
GetPrivateProfileIntA
lstrlenW
GetPrivateProfileStringA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetProcAddress
LoadLibraryA
InitializeCriticalSection
GetLocaleInfoA
lstrcpyA
CloseHandle
GetCurrentProcessId
CreateSemaphoreA
GetCurrentThreadId
ReleaseSemaphore
WaitForSingleObject
LocalFree
LocalAlloc
IsDBCSLeadByte
wsprintfA
GetWindowRect
RegisterWindowMessageA
IsWindow
GetWindow
IsCharAlphaNumericA
IsCharAlphaA
CharNextA
LoadBitmapA
RedrawWindow
EnableWindow
SendMessageA
UpdateWindow
GetParent
GetSystemMetrics
LoadIconA
LoadCursorA
SetCursor
PostMessageA
MessageBoxA
GetStockObject
GetBkColor
RegQueryValueExA
InitializeSecurityDescriptor
RegOpenKeyExA
RegCloseKey
RegCreateKeyA
SetSecurityDescriptorDacl
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegEnumKeyExA
SHGetFileInfoA
SHGetPathFromIDListA
SHBrowseForFolderA
ImageList_ReplaceIcon
ImageList_SetBkColor
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
SysFreeString
SysStringLen
SysAllocString
LoadTypeLi
VarUI4FromStr
SysAllocStringLen
RegisterTypeLi
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE