DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f2934f1107a08742a2a0e198986ed40688a42b91252e3039fbb4ed6fd7271427.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2934f1107a08742a2a0e198986ed40688a42b91252e3039fbb4ed6fd7271427.dll
Resource
win10v2004-20220901-en
Target
f2934f1107a08742a2a0e198986ed40688a42b91252e3039fbb4ed6fd7271427
Size
76KB
MD5
92c53614582f110f373b77dbd907b3bd
SHA1
b4999af167b1a9bb6687b5ae90e36380be170aa2
SHA256
f2934f1107a08742a2a0e198986ed40688a42b91252e3039fbb4ed6fd7271427
SHA512
b0e6d694ea21530f3061d519625eee4691e685f6507e8c6bdf48b4f040e3664bb2514608bbdb1bd6118e856ad6a349547ca8d3393e25780a0bf893393b27635c
SSDEEP
1536:QN/HjuFo71MERXjMtpPKgvvmT1/OpCSGBAiE:Q1juFQMEpjMtVTvY/eCSGBAi
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InternetCanonicalizeUrlA
ord398
ord540
ord384
ord567
ord825
ord3626
ord3663
ord2414
ord4275
ord3876
ord5981
ord6199
ord939
ord858
ord4129
ord5710
ord3439
ord4202
ord535
ord3874
ord537
ord2614
ord2096
ord2379
ord6467
ord6705
ord6784
ord2915
ord3317
ord1200
ord2818
ord5572
ord860
ord913
ord536
ord926
ord941
ord2859
ord4480
ord1641
ord1146
ord656
ord2864
ord2862
ord3396
ord3731
ord808
ord556
ord823
ord4269
ord1088
ord2122
ord6612
ord2121
ord4299
ord3021
ord1601
ord2764
ord940
ord859
ord4274
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord3953
ord2725
ord1131
ord818
ord6662
ord6283
ord6282
ord6502
ord1168
ord924
ord686
ord800
ord700
ord3571
ord6740
ord4424
ord4627
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord269
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord1197
ord1243
ord342
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4398
ord1776
ord4078
ord6055
ord2578
ord4218
ord2023
ord2411
ord3610
ord3402
ord4407
ord809
ord1182
ord1577
ord1575
ord1176
ord1116
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
__CxxFrameHandler
__dllonexit
?terminate@@YAXXZ
_except_handler3
strcpy
strlen
_CxxThrowException
_onexit
memcmp
realloc
malloc
free
_purecall
memcpy
atoi
strcmp
sprintf
memset
_mbscmp
_EH_prolog
HeapDestroy
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetProcAddress
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
GetLastError
lstrcpyA
LoadLibraryA
lstrcatA
LocalFree
lstrcpyW
WinExec
SetCurrentDirectoryA
GetSystemDirectoryA
Sleep
HeapFree
HeapAlloc
GetProcessHeap
LocalAlloc
GetModuleFileNameA
SendMessageA
DispatchMessageA
TranslateMessage
GetKeyState
GetDC
ShowWindow
LoadBitmapA
CharNextA
GetFocus
GetClientRect
EnableWindow
ReleaseDC
SetPixel
RegDeleteKeyA
RegQueryInfoKeyA
RegEnumKeyA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
SHGetFileInfoA
ImageList_AddMasked
ImageList_GetImageCount
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
SysStringLen
SysAllocStringByteLen
SysAllocString
SysFreeString
VariantClear
VariantInit
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ