DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
9e784915030e6786240861ff2c23edb949fd764ecf9ec67f0649eb7d73546c4e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9e784915030e6786240861ff2c23edb949fd764ecf9ec67f0649eb7d73546c4e.dll
Resource
win10v2004-20220901-en
Target
9e784915030e6786240861ff2c23edb949fd764ecf9ec67f0649eb7d73546c4e
Size
199KB
MD5
04d60829350fd98bc05a0479c28438e2
SHA1
62b70d07bf884b9675273c5d410352aec7972466
SHA256
9e784915030e6786240861ff2c23edb949fd764ecf9ec67f0649eb7d73546c4e
SHA512
f949779cb7b2dedc0213607efeb8a517bcb290eafab77760fc2a57bffacaab67157badbca420ce97866ec3ffdda0001802a4f5bcb0ae53ef691e23c0f27e1ae6
SSDEEP
3072:qsoD4wIFFt4Xvoiq/WnYr0Dknv9XkYsKl1YtByR1L4ve19liziK:F+7IFAf8/WYrCsGTYwBu94vEqz7
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
MultiByteToWideChar
WideCharToMultiByte
GetLastError
lstrcatA
GetModuleHandleA
RaiseException
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
LockResource
FindResourceExA
EnterCriticalSection
LeaveCriticalSection
lstrlenA
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
DeleteFileA
GetVolumeInformationA
CloseHandle
WriteFile
CreateFileA
CopyFileA
CreateThread
GetTickCount
MoveFileA
ReadFile
GetFileSize
Sleep
SetEndOfFile
FlushFileBuffers
SetStdHandle
lstrcpyA
lstrlenW
GetModuleFileNameA
GetTempPathA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetFilePointer
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualFree
HeapCreate
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
GetCPInfo
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
QueryPerformanceCounter
GetCurrentProcessId
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
LCMapStringA
LCMapStringW
GetOEMCP
CharNextA
wsprintfW
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
SHGetSpecialFolderPathA
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoGetClassObject
CoInitialize
RegisterTypeLi
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
VarUI4FromStr
PathFileExistsA
PathFindExtensionA
CoInternetGetSession
InternetSetOptionA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ