DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
30a13574abe658b90d0b79f6efffa119fba20ac906fb579ab87e5cb4b18ed168.dll
Resource
win7-20220812-en
Target
30a13574abe658b90d0b79f6efffa119fba20ac906fb579ab87e5cb4b18ed168
Size
228KB
MD5
d9bc0ff81298e631ff68d2d1d95baa10
SHA1
5a79912831f8f5e74e3055bf37be2f8c52da043c
SHA256
30a13574abe658b90d0b79f6efffa119fba20ac906fb579ab87e5cb4b18ed168
SHA512
7b7a2b568cb3c97df44fd818f6fdf12c41d813897c69f9e50e878b9ee5b78b5f60d6d8dac29d51d79709a6f29ea7fb0fa6b87266153847c23a20ee5ff8b7a95b
SSDEEP
6144:Gjfl4ZaDnm+onhU0q/DgkvsMG0sydg4mrAd:GLKoDnm4/DgkUSQr
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
ExitProcess
GetSystemTime
lstrcatW
lstrcpyW
EnterCriticalSection
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
FlushFileBuffers
SetStdHandle
LeaveCriticalSection
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
GetStringTypeA
GetVolumeInformationA
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
InterlockedExchange
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcpyA
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
SetLastError
TlsFree
VirtualQuery
DisableThreadLibraryCalls
RtlUnwind
HeapFree
RaiseException
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
TlsSetValue
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
HeapSize
GetMenu
SetTimer
CharNextA
IsWindowVisible
GetDoubleClickTime
wsprintfA
CreateDialogParamA
KillTimer
wsprintfW
IsDlgButtonChecked
GetKBCodePage
LoadStringA
GetBkColor
RegCreateKeyA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegSetValueExA
ShellExecuteA
SHGetSpecialFolderPathA
StringFromGUID2
CoCreateInstance
CoTaskMemFree
StringFromCLSID
CoTaskMemRealloc
CoTaskMemAlloc
LoadTypeLi
DispCallFunc
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
VariantInit
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantClear
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ