DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b6b11cb747447e0689b0f129a161d4e5fc1d9bce0b3ecd885ec0cd41fcfac1ea.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6b11cb747447e0689b0f129a161d4e5fc1d9bce0b3ecd885ec0cd41fcfac1ea.dll
Resource
win10v2004-20220812-en
Target
b6b11cb747447e0689b0f129a161d4e5fc1d9bce0b3ecd885ec0cd41fcfac1ea
Size
48KB
MD5
0fdf80ad05c0602f8c603038e055bdaa
SHA1
cc0c1846091f7af4b69fb5c9042e50cd3780fdcf
SHA256
b6b11cb747447e0689b0f129a161d4e5fc1d9bce0b3ecd885ec0cd41fcfac1ea
SHA512
209dd05da62e3809d77bba60f28660cadca74e3654640c040d04989ed0c05b5d603cae941d6e98f2707aff2c1007edc1899eb4de85ad0fd295a37fd4a5b9d828
SSDEEP
768:hXtehDLhoALZQ4E2tup9n4ZVH5nvKwoJlba3ALKzBOwgvDM8VzPQaI8QB:hXtKDLhoyZEfp94v5veBFKVOS8NPg8QB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetProcAddress
InterlockedIncrement
GetCurrentProcessId
GetCommandLineW
GetLastError
CreateEventA
WritePrivateProfileStringA
GetSystemDirectoryA
GetWindowsDirectoryA
Sleep
CreateThread
WideCharToMultiByte
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
Process32First
Process32Next
CloseHandle
LoadLibraryA
DeleteFileA
CreateWindowExA
ShowWindow
SetWindowTextA
SendMessageA
KillTimer
FindWindowExA
PostMessageA
DefWindowProcA
CallNextHookEx
RegisterClassExA
GetMessageA
TranslateMessage
DispatchMessageA
IsWindow
SetTimer
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strcmp
strchr
_strlwr
fopen
fwrite
fclose
strcat
free
_initterm
malloc
_adjust_fdiv
_stricmp
rand
strrchr
strstr
strlen
memcmp
memcpy
memset
_purecall
strcpy
sprintf
_access
??2@YAPAXI@Z
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ