DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
db31f86a5099b734cf90c9d5848842d66ce162f00f11fa0c22775e26c0f3c546.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
db31f86a5099b734cf90c9d5848842d66ce162f00f11fa0c22775e26c0f3c546.dll
Resource
win10v2004-20220901-en
Target
db31f86a5099b734cf90c9d5848842d66ce162f00f11fa0c22775e26c0f3c546
Size
48KB
MD5
804260c97eac23f9e645d69ee4d19b65
SHA1
3ea1aafd566099d8d4465fe39ff5e57688c63f62
SHA256
db31f86a5099b734cf90c9d5848842d66ce162f00f11fa0c22775e26c0f3c546
SHA512
702161eebdcbadf6fe1ab7851e3fc222e0bb43e485ea7dc7bc2bc6ec96c6acdacd7701415877dfdac050c175de816448e8807ff57b6a2125b82064bc5a73a52d
SSDEEP
768:PQT5OMn7ibKxAPkCC9lLu/LAAlh3WBIbPovZP+25kK8TqmVpz4t1mn:PQT4Mn7sEAPTARu/LAAD3WBIbPOYftuo
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetLastError
GetSystemDirectoryA
GetWindowsDirectoryA
CloseHandle
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetCurrentProcessId
Process32Next
Process32First
Sleep
CreateThread
WideCharToMultiByte
CreateEventA
InterlockedIncrement
GetModuleFileNameA
WritePrivateProfileStringA
GetLocalTime
LoadLibraryA
GetProcAddress
DeleteFileA
GetSystemInfo
GetCommandLineW
TranslateMessage
DispatchMessageA
SetWindowTextA
SendMessageA
FindWindowExA
SetTimer
PostMessageA
DefWindowProcA
CallNextHookEx
IsWindow
CreateWindowExA
ShowWindow
RegisterClassExA
GetMessageA
KillTimer
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
_purecall
strstr
_strlwr
strchr
fopen
fwrite
fclose
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
rand
strlen
memcpy
strrchr
strcpy
strcat
memset
strcmp
??2@YAPAXI@Z
sprintf
??3@YAXPAX@Z
_access
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ