DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
440c9a86e4b1059b6b166185e1df5a70039cec0ece978d55ebb430e7517e89ad.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
440c9a86e4b1059b6b166185e1df5a70039cec0ece978d55ebb430e7517e89ad.dll
Resource
win10v2004-20220901-en
Target
440c9a86e4b1059b6b166185e1df5a70039cec0ece978d55ebb430e7517e89ad
Size
188KB
MD5
43b108fb0dd85792a889aa9d76bd2c60
SHA1
107b53a2f2c79df53b9f734a1f3c504967c3572b
SHA256
440c9a86e4b1059b6b166185e1df5a70039cec0ece978d55ebb430e7517e89ad
SHA512
d96888ccb95ec8af481ec19bfd2846476e9a67f342230e62b226819a8e064f9d7d932f6075709204fa3bdc696d2ce66f729e3a3e9c29810fe5ca4434b0ddbc57
SSDEEP
3072:JzRFiOL+eYg7sArG3ZK8QD2RtoWcPSAQCsMx9xncvg1hBAyuq+qBy4P7M4a:Jzjj7sAr7EtoRSDCxnxncolAl2M4a
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegQueryValueExW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
GetDeviceCaps
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetCurrentProcess
SetProcessWorkingSetSize
GlobalDeleteAtom
GlobalAddAtomW
RaiseException
LoadLibraryW
GetProcAddress
FreeLibrary
lstrcmpiW
GetModuleFileNameW
GetModuleHandleW
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
lstrlenA
lstrcpynW
CompareStringW
GetVersionExW
WaitForSingleObject
GetExitCodeThread
SetLastError
QueryDosDeviceW
GetVersion
CreateFileA
DeviceIoControl
CreateFileW
GetDriveTypeW
lstrcpyW
GetLastError
WideCharToMultiByte
MultiByteToWideChar
Sleep
CloseHandle
CompareStringA
GetFileAttributesW
SetErrorMode
CreateMutexW
WNetGetConnectionW
WNetCancelConnection2W
WNetAddConnection2W
_wcsnicmp
wcslen
wcschr
wcscmp
??2@YAPAXI@Z
_initterm
_adjust_fdiv
__dllonexit
_onexit
malloc
memmove
_purecall
??3@YAXPAX@Z
wcsstr
towupper
_wtoi
iswdigit
_wtol
iswspace
_vsnwprintf
_except_handler3
free
wcsncpy
_snwprintf
_beginthreadex
_wcsicmp
wcsncmp
wcsrchr
wcspbrk
RegisterDragDrop
RevokeDragDrop
StringFromCLSID
CoTaskMemFree
CoCreateInstance
OleLockRunning
CoUnmarshalInterface
CoMarshalInterface
CreateStreamOnHGlobal
SysAllocString
SysFreeString
SysAllocStringLen
LoadTypeLi
RegisterTypeLi
SysStringLen
LoadRegTypeLi
VariantClear
VariantInit
VariantCopy
VariantChangeType
ShellExecuteExW
PathGetCharTypeA
PathGetCharTypeW
GetWindowLongW
SetWindowLongW
BeginPaint
EndPaint
UnregisterClassW
DestroyAcceleratorTable
GetClientRect
CreateAcceleratorTableW
DefWindowProcW
InvalidateRgn
InvalidateRect
SetFocus
GetFocus
IsWindow
DestroyWindow
GetDC
ReleaseDC
KillTimer
SetTimer
UnregisterHotKey
SetRect
EqualRect
GetWindowRect
GetWindow
GetTopWindow
FillRect
SetLayeredWindowAttributes
GetDesktopWindow
GetClassNameA
GetWindowThreadProcessId
CreateWindowExW
RegisterHotKey
IsIconic
GetParent
SendMessageTimeoutA
RegisterClassW
LoadCursorW
CharNextW
LoadStringW
PostMessageW
ShowWindow
GetClassNameW
FindWindowW
EnumWindows
SetForegroundWindow
SendMessageW
GetCursorPos
IsWindowVisible
CharNextA
GetAsyncKeyState
SetWindowPos
CloseThemeData
OpenThemeData
DrawThemeParentBackground
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE