CreateProcessNotify
DllCanUnloadNow
DllGetClassObject
Setconfig
Setskin
Static task
static1
Behavioral task
behavioral1
Sample
fd903905bff949d94373c74c08984fcc5635c02dbeae01f4057c97126bcdbfbf.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fd903905bff949d94373c74c08984fcc5635c02dbeae01f4057c97126bcdbfbf.dll
Resource
win10v2004-20220812-en
Target
fd903905bff949d94373c74c08984fcc5635c02dbeae01f4057c97126bcdbfbf
Size
45KB
MD5
55ba4137c059e182f1486e5f788e312e
SHA1
f7b9296d4867a25b5765edbcf011fdbd13543358
SHA256
fd903905bff949d94373c74c08984fcc5635c02dbeae01f4057c97126bcdbfbf
SHA512
f0da6503250719f113186ec616bca7d4af69bc9bd672c0629c5fe04b2188443f1294b3328110ca6bf81fd9b13b0ab593727b92fb7e8af1ee77a7826953e74b6e
SSDEEP
768:tEqaLzvLGUGjgSvNGk1A03o+azOpCz1jpTX02JRhBYz838c0geJJ7UobxfWKgV5+:toL3GRkWEMAAF6OpCzdq2XhBfsBttVIK
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sleep
GetProcAddress
LoadLibraryA
lstrcatA
CreateMutexA
ExitProcess
CreateThread
lstrcpyA
DisableThreadLibraryCalls
GetLastError
CloseHandle
FindClose
FindNextFileA
FindFirstFileA
GetDriveTypeA
UnmapViewOfFile
FlushViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
GetWindowsDirectoryA
GetCurrentProcess
FreeLibrary
DeviceIoControl
lstrcatW
MultiByteToWideChar
GlobalFree
LoadLibraryExA
GlobalAlloc
GetModuleHandleA
RaiseException
InterlockedExchange
LocalAlloc
strstr
free
strncpy
rand
srand
fopen
printf
fscanf
fclose
_strlwr
CreateProcessNotify
DllCanUnloadNow
DllGetClassObject
Setconfig
Setskin
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ