DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b07ec519e739ac1f9b675999fc1227664a101c4418b5f46e36aaeef7acf64deb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b07ec519e739ac1f9b675999fc1227664a101c4418b5f46e36aaeef7acf64deb.dll
Resource
win10v2004-20220812-en
Target
b07ec519e739ac1f9b675999fc1227664a101c4418b5f46e36aaeef7acf64deb
Size
181KB
MD5
023785e6f6f6af7cf6ecf6b2747cad60
SHA1
1805dc66862dfca36895b844cd19e7ef07bd011b
SHA256
b07ec519e739ac1f9b675999fc1227664a101c4418b5f46e36aaeef7acf64deb
SHA512
6b7c37d47ae6c92191ee13dd11fd0c6af246ca63e4a50dfdac8d3d5fd6893c660e6b14bc1949d43a293a1efc947c5b8e2e96adb437cf18042d17ae6a820730a4
SSDEEP
3072:FBNG1NweyGfy1ndqT7ifBEWEF4515dOGVg6YIpDO+FB3An9fXj:FCNryGfodQy515dOwYIJO+FNyfXj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHDeleteKeyA
ord4080
ord4622
ord4424
ord3579
ord614
ord290
ord4204
ord6876
ord6778
ord859
ord665
ord1979
ord5186
ord354
ord800
ord2764
ord4202
ord860
ord540
ord825
ord823
ord535
ord858
ord925
ord537
ord939
ord6779
ord4278
ord6663
ord6648
ord6877
ord5683
ord2818
ord3079
ord5442
ord5773
ord353
ord6385
ord4129
ord4277
ord922
ord924
ord2915
ord3825
ord3831
ord3830
ord3353
ord2976
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord923
ord389
ord5207
ord2803
ord3318
ord1988
ord690
ord5710
ord1105
ord1158
ord541
ord500
ord801
ord772
ord6662
ord536
ord6143
ord2763
ord5608
ord6883
ord539
ord926
ord1601
ord861
ord1154
ord6467
ord1200
ord2486
ord940
ord941
printf
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
memcmp
atoi
_onexit
__dllonexit
_strcmpi
_wcsicmp
_CxxThrowException
rename
localtime
asctime
free
memset
malloc
atof
time
fclose
fputs
fopen
rand
srand
_ftol
__CxxFrameHandler
memcpy
strcpy
_mbscmp
sprintf
strstr
strcat
strlen
realloc
LocalFree
ExpandEnvironmentStringsA
CopyFileA
FindFirstFileA
FindNextFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
MulDiv
GetVersionExA
GetLocaleInfoA
GetVersion
GetLastError
lstrcmpA
FreeLibrary
lstrcpynA
lstrcatA
LoadLibraryA
GetProcAddress
WriteFile
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
Sleep
WideCharToMultiByte
CreateProcessA
CreateThread
ResumeThread
lstrlenA
GetWindowsDirectoryA
GetSystemDirectoryA
OpenFile
CreateFileA
GetFileSize
ReadFile
CloseHandle
GetModuleFileNameA
DeleteFileA
lstrcpyA
EndDialog
GetDlgItem
GetDlgItemTextA
MessageBoxW
FindWindowExA
CallWindowProcA
SetWindowLongA
SetForegroundWindow
SendMessageA
GetParent
PostMessageA
IsWindow
EnumWindows
SetFocus
WaitForInputIdle
GetForegroundWindow
ShowWindow
SetDlgItemTextA
ReleaseDC
ScreenToClient
ClientToScreen
GetCursorPos
GetDesktopWindow
GetWindowRect
SetWindowPos
GetWindowDC
GetDC
DialogBoxParamA
GetSystemMetrics
EnableWindow
wsprintfA
IsCharAlphaNumericA
GetWindowThreadProcessId
IsChild
SetWindowTextA
MessageBoxA
DeleteObject
SetPixel
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontA
CreateSolidBrush
SetTextColor
SetBkColor
GetDeviceCaps
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyExA
RegOpenKeyExA
ShellExecuteA
ord252
CoInitialize
CoUninitialize
CoCreateInstance
SysFreeString
VariantClear
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
SysAllocStringLen
VariantCopy
SysAllocStringByteLen
SysStringByteLen
OleLoadPicturePath
OleSavePictureFile
SysAllocString
GetErrorInfo
VariantInit
InternetOpenA
InternetOpenUrlA
InternetFindNextFileA
FtpOpenFileA
FtpFindFirstFileA
InternetWriteFile
FtpCreateDirectoryA
DeleteUrlCacheEntry
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
InternetCloseHandle
InternetReadFile
InternetConnectA
HttpSendRequestA
HttpOpenRequestA
WSACleanup
gethostbyname
inet_ntoa
WSAStartup
CertOpenSystemStoreA
CertCloseStore
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ