DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
54fc733f8d7bf05f46fafd4e8b7751abcffa1f8e3a68d4fd9b0a9c995d6f936e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
54fc733f8d7bf05f46fafd4e8b7751abcffa1f8e3a68d4fd9b0a9c995d6f936e.dll
Resource
win10v2004-20221111-en
Target
54fc733f8d7bf05f46fafd4e8b7751abcffa1f8e3a68d4fd9b0a9c995d6f936e
Size
293KB
MD5
e2ca2860f9fe0c341dc66c6d5f194813
SHA1
254fdda2df9827253f7c05b0107b3d2761fe5237
SHA256
54fc733f8d7bf05f46fafd4e8b7751abcffa1f8e3a68d4fd9b0a9c995d6f936e
SHA512
beced6462decbe4b11ab89cb06de33275dc10d42cd6271d18df51362df598dbc160d04b8f35a8fa5b13f2de8be218763365d0d5e124a535df2da8babea712e61
SSDEEP
6144:QXl7o6SeKlnxxd2uE+R1zO7UusiEGHF5fa3VOiXgnBpZJLohkP6ftb:iFo6SeKlxiuE+R1z0sgHF5N/ZFoaG
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateDirectoryW
TerminateProcess
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
MultiByteToWideChar
FindClose
RaiseException
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
SizeofResource
lstrcmpiW
LoadLibraryExW
GetModuleHandleW
FindResourceW
EncodePointer
DecodePointer
GetThreadLocale
SetThreadLocale
ReadConsoleW
ReadFile
GetCurrentProcessId
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
LoadLibraryW
GetCurrentProcess
GetProcAddress
WideCharToMultiByte
FreeLibrary
SetEndOfFile
CreateFileW
WriteConsoleW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
IsDebuggerPresent
OutputDebugStringW
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
GetACP
LoadStringW
CharNextW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoTaskMemRealloc
StringFromGUID2
CoInitialize
CoTaskMemFree
CoCreateInstance
LoadRegTypeLi
SysFreeString
UnRegisterTypeLi
RegisterTypeLi
SysAllocString
LoadTypeLi
VarUI4FromStr
SysStringLen
PathFileExistsW
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ