DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
1be114b88fc28f1249e6874cd57fb837d3041fae02e62273d7b588e274d89a6d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1be114b88fc28f1249e6874cd57fb837d3041fae02e62273d7b588e274d89a6d.dll
Resource
win10v2004-20220901-en
Target
1be114b88fc28f1249e6874cd57fb837d3041fae02e62273d7b588e274d89a6d
Size
48KB
MD5
83a72d697dde2f960b7586cefbc80641
SHA1
ba17ab8594fba4512d129fe4918ab17aac9aa1bc
SHA256
1be114b88fc28f1249e6874cd57fb837d3041fae02e62273d7b588e274d89a6d
SHA512
c5a5e650392f2243895e0324c01af71d45bd1647c651dbb5943d8d9a985414ef64b401d8e0069e68b41a9cc8b8ab2f90ac45249fb20e13212c5db91f7a24f6be
SSDEEP
768:zlUfZemK9tdud2570ejUJidHEM+UZyBXZvfn+i7sOjokrdE91sEOUSnYC:Zqz4ud/xi+3X1f+iDJEDsPD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
CloseHandle
LoadLibraryA
GetCommandLineW
GetLocalTime
GetSystemInfo
WritePrivateProfileStringA
GetCurrentProcessId
GetProcAddress
Sleep
CreateThread
WideCharToMultiByte
Process32Next
Process32First
DeleteFileA
GetLastError
GetWindowsDirectoryA
GetSystemDirectoryA
CreateEventA
HeapAlloc
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
PostMessageA
DefWindowProcA
RegisterClassExA
CreateWindowExA
ShowWindow
TranslateMessage
DispatchMessageA
SetWindowTextA
SendMessageA
CallNextHookEx
KillTimer
SetTimer
IsWindow
FindWindowExA
GetMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
fopen
fwrite
_strlwr
fclose
strcmp
strcpy
strstr
free
_initterm
malloc
_adjust_fdiv
_stricmp
strchr
strcat
_access
strrchr
sprintf
rand
strlen
memcmp
memcpy
memset
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ