DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c137c2bae8089cc0b3312ba6e7abd3e863737d8ad76ceffa293459b69c38e4eb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c137c2bae8089cc0b3312ba6e7abd3e863737d8ad76ceffa293459b69c38e4eb.dll
Resource
win10v2004-20220812-en
Target
c137c2bae8089cc0b3312ba6e7abd3e863737d8ad76ceffa293459b69c38e4eb
Size
48KB
MD5
6818cf6904da721caa22db33604c66ff
SHA1
08152c563c31e86924fdae5d6cf515f7ccd96e54
SHA256
c137c2bae8089cc0b3312ba6e7abd3e863737d8ad76ceffa293459b69c38e4eb
SHA512
ae75629098c62b64e260c9ca524e2d88ef19d6359d0bc2771c00ade146de0921fa33c4c8beb577243d4022f5fe4b32d21f517ff9f9282ae4cb3936bf40256a2f
SSDEEP
768:zlUfZemK9tdud2570ejUJidHEM+UZyBXZvfn+i7sOjokrdE91sEOUSnnC:Zqz4ud/xi+3X1f+iDJEDsPC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
CloseHandle
LoadLibraryA
GetCommandLineW
GetLocalTime
GetSystemInfo
WritePrivateProfileStringA
GetCurrentProcessId
GetProcAddress
Sleep
CreateThread
WideCharToMultiByte
Process32Next
Process32First
DeleteFileA
GetLastError
GetWindowsDirectoryA
GetSystemDirectoryA
CreateEventA
HeapAlloc
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
PostMessageA
DefWindowProcA
RegisterClassExA
CreateWindowExA
ShowWindow
TranslateMessage
DispatchMessageA
SetWindowTextA
SendMessageA
CallNextHookEx
KillTimer
SetTimer
IsWindow
FindWindowExA
GetMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
fopen
fwrite
_strlwr
fclose
strcmp
strcpy
strstr
free
_initterm
malloc
_adjust_fdiv
_stricmp
strchr
strcat
_access
strrchr
sprintf
rand
strlen
memcmp
memcpy
memset
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ