DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d9004d709e0d74ac6e543ad018ad02e55d6d2de9b74d98d11587514cc6622fcf.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d9004d709e0d74ac6e543ad018ad02e55d6d2de9b74d98d11587514cc6622fcf.dll
Resource
win10v2004-20220901-en
Target
d9004d709e0d74ac6e543ad018ad02e55d6d2de9b74d98d11587514cc6622fcf
Size
131KB
MD5
5b80e2afb5658e0021a9b80d4f456a8c
SHA1
c7d48da910227b9a40078f3409586da77af5f9d0
SHA256
d9004d709e0d74ac6e543ad018ad02e55d6d2de9b74d98d11587514cc6622fcf
SHA512
9a3e9de9275a1bb0ff2461526a528b3094d1d3f198f37a2e707f73b4c1c6067988c2ff977add9268c2cf7944c8fb1ba6368e8e5e025b08e219eeaf216658db08
SSDEEP
3072:qyp+qsnDUZGgFyqiQihnHR2OeOO0WdICQYJT+hmo:HsnDUZGTFQ+vsB2E5+U
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
LoadLibraryA
VirtualAlloc
InitializeCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
MessageBoxA
CoCreateInstance
VariantClear
SysFreeString
VariantInit
ord30
ord21
ord16
ord23
ord18
ord32
ord15
_adjust_fdiv
_initterm
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
_CxxThrowException
??1type_info@@UAE@XZ
malloc
free
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ