DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6595b3b86c8f2362b5dc4b555ad63b69e3a99254153955b8f37e784860ffaa51.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6595b3b86c8f2362b5dc4b555ad63b69e3a99254153955b8f37e784860ffaa51.dll
Resource
win10v2004-20221111-en
Target
6595b3b86c8f2362b5dc4b555ad63b69e3a99254153955b8f37e784860ffaa51
Size
293KB
MD5
97b48a1188fbf01a0f63667174fe41ff
SHA1
9adca9c9d2bdba13f8df000ec994b698a3a1f065
SHA256
6595b3b86c8f2362b5dc4b555ad63b69e3a99254153955b8f37e784860ffaa51
SHA512
279768304e5d09bd26cb4c7d8d70237e16fa629ce12b1de19271e8d918fce344a85ea3e8eec171917248527c99c4f79a0e98e290452a9401641bda3022099118
SSDEEP
6144:9Xl7o6SeKlnxxd2uE+R1zO7UusiEGHF5fa3VOiXgnBpZJLohkI6xtb:ZFo6SeKlxiuE+R1z0sgHF5N/ZFoJ0
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
CreateDirectoryW
TerminateProcess
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
MultiByteToWideChar
FindClose
RaiseException
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadResource
SizeofResource
lstrcmpiW
LoadLibraryExW
GetModuleHandleW
FindResourceW
EncodePointer
DecodePointer
GetThreadLocale
SetThreadLocale
ReadConsoleW
ReadFile
GetCurrentProcessId
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
LoadLibraryW
GetCurrentProcess
GetProcAddress
WideCharToMultiByte
FreeLibrary
SetEndOfFile
CreateFileW
WriteConsoleW
SetFilePointerEx
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
IsDebuggerPresent
OutputDebugStringW
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
CompareStringW
LCMapStringW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
GetACP
LoadStringW
CharNextW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoTaskMemRealloc
StringFromGUID2
CoInitialize
CoTaskMemFree
CoCreateInstance
LoadRegTypeLi
SysFreeString
UnRegisterTypeLi
RegisterTypeLi
SysAllocString
LoadTypeLi
VarUI4FromStr
SysStringLen
PathFileExistsW
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ