DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7c865386c791e99bcdc97d71d535dc54b83bd47f75bf13a38f64595739240f48.dll
Resource
win7-20221111-en
Target
7c865386c791e99bcdc97d71d535dc54b83bd47f75bf13a38f64595739240f48
Size
148KB
MD5
af417a89bfe087360575658e1c41ed72
SHA1
7cbc6fbbfb431063cd9967d10f8941cd82c24b26
SHA256
7c865386c791e99bcdc97d71d535dc54b83bd47f75bf13a38f64595739240f48
SHA512
22396a941a3fb197702a5dd5c3a777bb09fbb1554dc9492d2a0e22aefc1582256438ad1960a9c943ad3bebee7060f93283a3a735a2de9b5bd946c2559f904611
SSDEEP
3072:VsmH7iXeUWcyuVkLXkOtI3d2Ou5EPRfCK86cUajasWhtK:/SeUWcyuVkL00OEQKK8hUa+sWhtK
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InternetCrackUrlA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrlenA
lstrcmpiA
DisableThreadLibraryCalls
lstrcpynA
lstrcpyA
GetModuleFileNameA
lstrcatA
IsDBCSLeadByte
InterlockedIncrement
InterlockedDecrement
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
LockResource
GetLocaleInfoA
GetProcAddress
LoadLibraryA
IsBadWritePtr
lstrcmpA
CloseHandle
CreateProcessA
GetVersion
CompareStringA
CompareStringW
WritePrivateProfileStringA
GetWindowsDirectoryA
GetShortPathNameA
GetStringTypeA
LCMapStringW
LCMapStringA
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetACP
InterlockedExchange
GetStringTypeW
SetEnvironmentVariableA
FindResourceExA
FlushFileBuffers
GetEnvironmentStrings
SetStdHandle
SetFilePointer
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCPInfo
GetOEMCP
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetCurrentThreadId
GetCommandLineA
HeapCreate
VirtualFree
TerminateProcess
GetCurrentProcess
RtlUnwind
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
CharLowerA
CharNextA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
SysAllocString
LoadTypeLi
UnRegisterTypeLi
SysStringLen
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
SysFreeString
SHGetValueA
SHSetValueA
PathFindExtensionA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE