DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
414cec3750110ee45dc3d6e4cacd240653a839ec7a4bbc83a5cfc44ccfc69c53.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
414cec3750110ee45dc3d6e4cacd240653a839ec7a4bbc83a5cfc44ccfc69c53.dll
Resource
win10v2004-20230220-en
Target
414cec3750110ee45dc3d6e4cacd240653a839ec7a4bbc83a5cfc44ccfc69c53
Size
748KB
MD5
fb89d3016a6246200cf9522856757d30
SHA1
46c5a61e062150cb92d7f2ecc8ef8c63175b6acc
SHA256
414cec3750110ee45dc3d6e4cacd240653a839ec7a4bbc83a5cfc44ccfc69c53
SHA512
3d183287be5fba2dcdcf59a738c903d418a4e158f466a286d489b38042f1ca4ba66d8343c9e5b20c188f0b3fb324d5711947723c1a84e1864321ff2477335e01
SSDEEP
6144:UzYQ8FPYuxNzyu3mAJiQzcNcq15ayLOmOUAOkFfFsVr2O3:aQFP/PzyZAJiQzcNcsaOOUkeYO3
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WaitForSingleObject
CreateProcessW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
HeapAlloc
HeapFree
GetProcessHeap
GetCurrentThreadId
GetLastError
GetModuleHandleW
DecodePointer
HeapReAlloc
HeapSize
RaiseException
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
GetExitCodeProcess
GlobalLock
GlobalUnlock
lstrcpynW
ReadConsoleW
SetEndOfFile
WriteConsoleW
SetFilePointerEx
SetStdHandle
OpenProcess
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetACP
GetConsoleMode
GetConsoleCP
GetFileType
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetModuleFileNameA
GetModuleHandleExW
ExitProcess
LoadLibraryExW
InterlockedFlushSList
RtlUnwind
InterlockedDecrement
TerminateProcess
CreateDirectoryW
GetCurrentProcessId
FreeLibrary
CreateFileW
GetTempPathW
CloseHandle
FindClose
ReadFile
WriteFile
GetModuleFileNameW
OutputDebugStringW
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
EncodePointer
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
WritePrivateProfileStringW
GetPrivateProfileIntW
lstrlenW
GetPrivateProfileStringW
LoadLibraryW
GetCurrentProcess
GetProcAddress
FlushFileBuffers
QueryPerformanceCounter
wsprintfW
LoadStringW
LoadBitmapW
InsertMenuItemW
SetMenuItemBitmaps
InsertMenuW
CreatePopupMenu
DeleteObject
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegDeleteKeyW
RegDeleteValueW
RevertToSelf
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RegCloseKey
SHGetFolderPathW
DragQueryFileW
SHGetSpecialFolderPathW
ReleaseStgMedium
CoInitialize
IIDFromString
PathFileExistsW
StrStrIW
PathAppendW
PathFindExtensionW
PathIsDirectoryW
PathRemoveFileSpecW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ