DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4.dll
Resource
win10v2004-20221111-en
Target
4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4
Size
248KB
MD5
38dcf72fcdd4c9d8133a7c5ed59afbff
SHA1
5dfb480216d8a6ba230b04aef53257c5d726c4d3
SHA256
4b481585f55cab0dd514a9e4c65c71587e2695b527dd9e94e828277d712bb9d4
SHA512
7f1df60416ea97bcd150a890faa5e6c5c6ae84eabbfdb1200cbb78c8530a23a3a05d17e3ce06435e8ed55c78a794c77056c55106913da6b5340aa76fcebf8596
SSDEEP
3072:grhcH+gXNN7ysh4vkbZvWYdWMZwVZ1WDTSgrxwPvi44YBauccqTa3w:wcH+ghZ5WM6VPWD2yzKauC+w
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
ExitProcess
lstrcatW
lstrcpyW
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
Process32Next
Module32First
IsBadReadPtr
LeaveCriticalSection
FreeEnvironmentStringsW
FlushFileBuffers
SetStdHandle
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
DeleteCriticalSection
InitializeCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
DisableThreadLibraryCalls
GetVersionExA
InterlockedExchange
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
GetStringTypeW
GetStringTypeA
GetEnvironmentStrings
GetCPInfo
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
SetLastError
GetOEMCP
lstrcpyA
GetEnvironmentStringsW
LocalFree
RtlUnwind
HeapFree
RaiseException
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
TlsSetValue
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
HeapSize
TlsFree
IsBadCodePtr
SetTimer
LoadStringA
CharNextA
wsprintfA
KillTimer
wsprintfW
CallMsgFilterA
GetFocus
CreateMenu
GetDoubleClickTime
RegEnumKeyA
RegSetValueExA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegCreateKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
ShellExecuteA
CoTaskMemFree
CoTaskMemRealloc
StringFromCLSID
StringFromGUID2
CoTaskMemAlloc
CoCreateInstance
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantInit
DispCallFunc
VariantClear
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ