DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7945f0c33f08cfd0b9d75b967d1d4dba8d042de366bef0b0b9d175f64665538c.dll
Resource
win7-20220901-en
Target
7945f0c33f08cfd0b9d75b967d1d4dba8d042de366bef0b0b9d175f64665538c
Size
228KB
MD5
5558394942ebcb18a31167ef848b01d6
SHA1
79a98689fd42ea94162a7c45ba1e5c932d74dbd6
SHA256
7945f0c33f08cfd0b9d75b967d1d4dba8d042de366bef0b0b9d175f64665538c
SHA512
ef00c762618fa397069d04ae4434f337015cf5ab95edf772b04693295da4a4b6b74305f4d86efccc2e30297992dddd53181dd5e102f2c2f32a3317a013496441
SSDEEP
6144:OjyYDfcFJwnGbT43LLMG3iwJsYHRL/W0RjuFYP:O+SEgnGbE3LLMGzsSRL/YF8
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
UrlMkSetSessionOption
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
ExitProcess
lstrcatW
lstrcpyW
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
Process32Next
Module32First
InitializeCriticalSection
FlushFileBuffers
SetStdHandle
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
GetStringTypeA
GetThreadLocale
GetLocaleInfoA
FreeEnvironmentStringsW
GetACP
GetVersionExA
InterlockedExchange
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcpyA
DisableThreadLibraryCalls
GetStartupInfoA
IsBadCodePtr
IsBadReadPtr
GetCPInfo
GetOEMCP
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
SetLastError
TlsFree
HeapSize
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LocalFree
RtlUnwind
HeapFree
RaiseException
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
TlsSetValue
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
SetTimer
LoadStringA
CharNextA
wsprintfA
KillTimer
GetActiveWindow
wsprintfW
SetCaretBlinkTime
GetDoubleClickTime
CreateMenu
GetSystemMetrics
RegDeleteKeyA
RegSetValueExA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegCreateKeyA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
SHGetSpecialFolderPathA
ShellExecuteA
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
StringFromGUID2
CoCreateInstance
CoTaskMemFree
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantInit
DispCallFunc
VariantClear
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ