DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bd22b824a7e2f0eba2c4e22b61c00fffb658d8a165ca8b6af5768605754a802e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd22b824a7e2f0eba2c4e22b61c00fffb658d8a165ca8b6af5768605754a802e.dll
Resource
win10v2004-20220812-en
Target
bd22b824a7e2f0eba2c4e22b61c00fffb658d8a165ca8b6af5768605754a802e
Size
116KB
MD5
c4161fa1b3032b15a6db26bc1fd368df
SHA1
c5675d63aa228e0583f7bda23b73a966a40d52f4
SHA256
bd22b824a7e2f0eba2c4e22b61c00fffb658d8a165ca8b6af5768605754a802e
SHA512
02d13e1694c35671088289eb4aeedb052101ec8550c8209dc8c9c134c403d0a45a7c7215423fe5cb715a313e6ceac1700c1a625016403736f2a4d7b233f5bebe
SSDEEP
1536:3395XZIcLULq26TtxohYBNxTxKaelcIJCcBIkLjV5By+ULvNsWbr0OP/rEtJWAEN:HHXZI76TvhxT4LtV33klsWBPQt4AEN
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ord16
ord18
ord57
ord23
ord15
ord58
ord32
ord30
ord43
ord44
ord21
VirtualAlloc
VirtualFree
HeapAlloc
GetProcessHeap
HeapFree
GetSystemDirectoryW
Sleep
lstrcpynW
GetVersionExW
GetComputerNameExW
GetCurrentProcess
FlushInstructionCache
LoadLibraryA
CompareStringW
InterlockedExchange
GetComputerNameW
LocalAlloc
ExpandEnvironmentStringsA
CreateActCtxW
ReleaseActCtx
ActivateActCtx
DeactivateActCtx
OutputDebugStringA
GetModuleFileNameW
LoadLibraryW
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
ExpandEnvironmentStringsW
SetLastError
GetLastError
EnterCriticalSection
LeaveCriticalSection
InterlockedCompareExchange
RtlUnwind
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetShortPathNameW
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
DisableThreadLibraryCalls
LocalFree
lstrlenW
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegConnectRegistryW
RegOpenKeyExW
RegCreateKeyW
RegOpenKeyW
RegQueryValueExW
RegCloseKey
SHBrowseForFolderW
SHGetPathFromIDListW
StringFromGUID2
CoTaskMemAlloc
CoInitializeEx
CoCreateInstanceEx
CoUninitialize
CoCreateGuid
CoSetProxyBlanket
CoTaskMemFree
SysAllocStringByteLen
SysAllocString
LoadRegTypeLi
SysStringLen
SysFreeString
SysStringByteLen
NetUseAdd
NetUseDel
RtlQueryEnvironmentVariable_U
RtlSetEnvironmentVariable
RtlInitUnicodeString
RtlExpandEnvironmentStrings_U
RtlDestroyEnvironment
RtlCreateEnvironment
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ