DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3531c2a0e559af0f1ce8d18cda393bffaf8147e7e2829a40f2ae29d3cf75df27.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3531c2a0e559af0f1ce8d18cda393bffaf8147e7e2829a40f2ae29d3cf75df27.dll
Resource
win10v2004-20230221-en
Target
3531c2a0e559af0f1ce8d18cda393bffaf8147e7e2829a40f2ae29d3cf75df27
Size
1.2MB
MD5
1fdcb86d6c9a7ee5232005738209f299
SHA1
a6144cfab1be73d34bd1b200a36851cf72cf3447
SHA256
3531c2a0e559af0f1ce8d18cda393bffaf8147e7e2829a40f2ae29d3cf75df27
SHA512
8be771fb06dc2a6398142dd67ee2aae7c711b3dfadbf544962ad6f10cde5662dc5c122b0d82888928cada9bb3e440d8eab852744cb6b58b6eb8904e1acb9185f
SSDEEP
12288:B3flH0YTeVVZ1URZztu6uBYEbTvihG602omzfeVFMmXjoVWx8ztYK:BdLKVZORZEB/nas2omre/FjAztYK
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
DecodePointer
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
DisableThreadLibraryCalls
OutputDebugStringW
EncodePointer
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
FindResourceExW
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadResource
LockResource
SizeofResource
FindResourceW
CreateFileW
ReadFile
WriteFile
CloseHandle
SetNamedPipeHandleState
WaitNamedPipeW
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
LoadLibraryExW
lstrcmpiW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetTempFileNameW
GetTempPathW
OpenMutexW
GetProcessId
LocalFree
InitializeCriticalSection
SetEvent
WaitForSingleObject
CreateEventW
Sleep
TerminateThread
GetCurrentThreadId
GetSystemWow64DirectoryW
GlobalUnlock
GlobalLock
VerSetConditionMask
GetFileAttributesW
VerifyVersionInfoW
FreeResource
GlobalAlloc
GlobalFree
MulDiv
GetDriveTypeW
DeviceIoControl
GetModuleHandleExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
ReleaseMutex
CreateMutexW
VirtualQuery
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
GetSystemInfo
VirtualProtect
LoadLibraryExA
GetPrivateProfileIntW
GetPrivateProfileStringW
GetUserDefaultUILanguage
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
ProcessIdToSessionId
OpenProcess
CreateFileA
GetModuleHandleA
SetCommTimeouts
WaitNamedPipeA
CreateThread
LoadLibraryA
FileTimeToLocalFileTime
CreateProcessW
WritePrivateProfileStringW
FileTimeToSystemTime
SystemTimeToFileTime
GetStringTypeW
SetLastError
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
QueryPerformanceCounter
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
GetThreadTimes
FreeLibraryAndExitThread
VirtualAlloc
InterlockedFlushSList
RtlUnwindEx
RtlPcToFileHeader
ExitThread
GetTimeZoneInformation
ExitProcess
GetStdHandle
GetFileType
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlushFileBuffers
GetConsoleCP
SetStdHandle
WriteConsoleW
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ