DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
StartW
Static task
static1
Behavioral task
behavioral1
Sample
260130cfd39bd76476002473fd59c377563641c6eab229517d7744417f90cf07.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
260130cfd39bd76476002473fd59c377563641c6eab229517d7744417f90cf07.dll
Resource
win10v2004-20220414-en
Target
260130cfd39bd76476002473fd59c377563641c6eab229517d7744417f90cf07
Size
17KB
MD5
e16f1a12b2e8bba5c13dd8bec55f80c1
SHA1
c243b337c0b6190b385df417cd53571ccc03a4bb
SHA256
260130cfd39bd76476002473fd59c377563641c6eab229517d7744417f90cf07
SHA512
2362bee14bb4cb0397069803c0d7d93469602b7c19afbfa1a18cb70de687cc7dea5285a1b0e94c446ceb893edbfa4077db0799f5fac9cad05861fe39e526cb58
SSDEEP
192:IuK4aFviNn/gYz703ZuQo8bgq207tQQWG47lwFrQZAtQaB/agoabSAg4QR5Nx7FU:qLkz7F1A2jQt47EgAtQaBLQRhFU
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
CreateProcessA
CreateRemoteThread
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetLastError
GetModuleHandleA
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualAllocEx
VirtualProtect
VirtualProtectEx
VirtualQuery
WriteProcessMemory
__dllonexit
__iob_func
_amsg_exit
_initterm
_lock
_onexit
_snprintf
_unlock
abort
calloc
exit
free
fwrite
malloc
memcpy
signal
strlen
strncmp
vfprintf
PeekMessageA
PostThreadMessageA
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
StartW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ