DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
210df97d8f9e85acbca562fe8dce834f58ab55ea7c4962ea12d4c25328741949.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
210df97d8f9e85acbca562fe8dce834f58ab55ea7c4962ea12d4c25328741949.dll
Resource
win10v2004-20220812-en
Target
210df97d8f9e85acbca562fe8dce834f58ab55ea7c4962ea12d4c25328741949
Size
240KB
MD5
979bec7219ccfd5a32fcca5cc38b5f00
SHA1
dc6e741b1023d696fb051d6466e7d818a67f7378
SHA256
210df97d8f9e85acbca562fe8dce834f58ab55ea7c4962ea12d4c25328741949
SHA512
4ba2510c23dbb516aa0b650ad8e27042678e863faa8944bfcd1b09a25c43e2b0b03cbdcf94dcd706d1fb47ee0196063cb3c5c69f501370b204a400f808122857
SSDEEP
6144:xg5csQ/P4Upe2bPGy6mp6mi00doFLLzdL:yysegU8GPGy/i6FL9
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
GetSystemTime
lstrcmpiW
ExitProcess
lstrcatW
lstrcpyW
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
Process32Next
Module32First
LeaveCriticalSection
FlushFileBuffers
SetStdHandle
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
GetStringTypeA
DeleteCriticalSection
InitializeCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
InterlockedExchange
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcpyA
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
DisableThreadLibraryCalls
RtlUnwind
HeapFree
RaiseException
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
TlsSetValue
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
HeapSize
TlsFree
SetLastError
TlsGetValue
SetTimer
GetInputState
LoadStringA
CharNextA
wsprintfA
KillTimer
wsprintfW
CreateMenu
SetCaretBlinkTime
RegCreateKeyA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegSetValueExA
SHGetSpecialFolderPathA
ShellExecuteA
CoTaskMemAlloc
CoTaskMemRealloc
StringFromGUID2
StringFromCLSID
CoTaskMemFree
CoCreateInstance
SysFreeString
DispCallFunc
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
VariantInit
VarUI4FromStr
VariantClear
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ