DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b41f9d9b46613d65bd7a4ec47e522f49b01e9c6fd1bac3ef4d3d3c5a9f2473bc.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b41f9d9b46613d65bd7a4ec47e522f49b01e9c6fd1bac3ef4d3d3c5a9f2473bc.dll
Resource
win10v2004-20220812-en
Target
b41f9d9b46613d65bd7a4ec47e522f49b01e9c6fd1bac3ef4d3d3c5a9f2473bc
Size
100KB
MD5
8a22e32619d18b311278e986df81a376
SHA1
cd6506a018228d5380b3398f8f60b6bbf5f84592
SHA256
b41f9d9b46613d65bd7a4ec47e522f49b01e9c6fd1bac3ef4d3d3c5a9f2473bc
SHA512
050d317b06ff901122f27a3af924272650304e69e71886382cdbd2e8b8bde9166263734b35aef1f5f19f10b19707853117d3f88735e70134f1997490160c16f3
SSDEEP
3072:vIKhgs2Z0csrxHnPiJdzYQRjM8pybvUGUq:wy22B9HqgKjM8pyT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WaitForSingleObject
GetLastError
LoadLibraryA
CloseHandle
GetProcessHeap
ReleaseMutex
CreateMutexA
CopyFileA
InterlockedExchange
CreateFileMappingA
LeaveCriticalSection
CreateThread
ExpandEnvironmentStringsA
WriteFile
GetModuleHandleA
LocalFree
GetProcAddress
Sleep
InterlockedDecrement
CreateDirectoryA
HeapFree
HeapAlloc
ReadFile
MapViewOfFile
InterlockedIncrement
EnterCriticalSection
GetModuleFileNameA
GetCurrentProcessId
CreateFileA
GetSystemTimeAsFileTime
DeleteFileA
FindFirstVolumeW
GetTempPathA
GetWindowsDirectoryA
FreeLibraryAndExitThread
IsBadStringPtrW
FreeConsole
GetShortPathNameW
SetConsoleWindowInfo
SetErrorMode
OpenJobObjectW
GetComputerNameW
GetEnvironmentStrings
PeekNamedPipe
GetAtomNameW
GetCurrentDirectoryW
GetVolumePathNameW
WaitForMultipleObjectsEx
lstrcpyA
SetConsoleActiveScreenBuffer
FreeResource
GetDefaultCommConfigW
ClearCommError
IsBadReadPtr
OpenEventA
GetBinaryTypeW
lstrcmpW
GetFileAttributesW
RegisterWaitForSingleObject
GetFileSize
EnumResourceNamesW
FormatMessageW
OpenFileMappingA
SetFilePointer
GetSystemDefaultUILanguage
SetFileTime
SearchPathA
SleepEx
OpenSemaphoreA
GetFileTime
ConvertDefaultLocale
DeviceIoControl
lstrcmpiA
GetFileType
GetCommandLineW
FindResourceExW
OpenMutexW
GlobalGetAtomNameA
CreateWaitableTimerA
HeapWalk
IsValidLanguageGroup
GlobalGetAtomNameW
GetExitCodeThread
GetVersionExA
IsValidLocale
SetEnvironmentVariableW
SetHandleInformation
GetVersion
SetConsoleTextAttribute
GetVolumeInformationA
FindFirstFileA
CreateEventA
GetCurrentThreadId
SetCurrentDirectoryA
WaitForMultipleObjects
CreateDirectoryW
SuspendThread
FindNextChangeNotification
WriteConsoleInputA
WriteFileEx
FileTimeToLocalFileTime
IsBadWritePtr
GlobalFindAtomA
FindNextVolumeW
CallNamedPipeA
PostQueuedCompletionStatus
GlobalFindAtomW
ConnectNamedPipe
LCMapStringA
OpenSemaphoreW
GetModuleHandleW
LocalAlloc
SetConsoleScreenBufferSize
UnlockFile
WaitNamedPipeA
AreFileApisANSI
AddAtomA
GetConsoleCP
CompareStringA
GetThreadTimes
GetSystemWow64DirectoryW
FindNextFileA
SetSystemTime
GetThreadLocale
GetLocaleInfoW
DeleteCriticalSection
OpenFileMappingW
OpenMutexA
TerminateThread
GetVolumePathNamesForVolumeNameW
GetDriveTypeA
GetEnvironmentVariableW
GetStringTypeW
GetHandleInformation
CopyFileExW
SHGetFolderPathA
DragAcceptFiles
SHGetPathFromIDListA
ShellExecuteExA
ExtractIconExW
SHParseDisplayName
CommandLineToArgvW
SHGetFileInfoW
ShellExecuteA
ShellExecuteW
SHGetFolderPathW
SHGetSpecialFolderLocation
SHBrowseForFolderW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ