DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
159b4761736381db1555555781b9b9f3fa00bda9b68256ff1ec0dd10e6ca9ea3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
159b4761736381db1555555781b9b9f3fa00bda9b68256ff1ec0dd10e6ca9ea3.dll
Resource
win10v2004-20220812-en
Target
159b4761736381db1555555781b9b9f3fa00bda9b68256ff1ec0dd10e6ca9ea3
Size
48KB
MD5
058b9b6f90b2bb54be36aa99d2ad33d1
SHA1
b421dae21680a1356112a749af1f940416b098fe
SHA256
159b4761736381db1555555781b9b9f3fa00bda9b68256ff1ec0dd10e6ca9ea3
SHA512
5f30b5130ee07f852e8d1caad6adb2acdb2c07a68034557f3bd96f492d72a3af3c2e76b06612c82e3193247e2282a5fea5a211d61a33ea0b40e0ec13af7b82d9
SSDEEP
768:hXtehDLhoALZQ4E2tup9n4ZVH5nvKwoJlba3ALKzBOwgvDM8VzPQaIzQB:hXtKDLhoyZEfp94v5veBFKVOS8NPgzQB
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetProcAddress
InterlockedIncrement
GetCurrentProcessId
GetCommandLineW
GetLastError
CreateEventA
WritePrivateProfileStringA
GetSystemDirectoryA
GetWindowsDirectoryA
Sleep
CreateThread
WideCharToMultiByte
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
Process32First
Process32Next
CloseHandle
LoadLibraryA
DeleteFileA
CreateWindowExA
ShowWindow
SetWindowTextA
SendMessageA
KillTimer
FindWindowExA
PostMessageA
DefWindowProcA
CallNextHookEx
RegisterClassExA
GetMessageA
TranslateMessage
DispatchMessageA
IsWindow
SetTimer
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strcmp
strchr
_strlwr
fopen
fwrite
fclose
strcat
free
_initterm
malloc
_adjust_fdiv
_stricmp
rand
strrchr
strstr
strlen
memcmp
memcpy
memset
_purecall
strcpy
sprintf
_access
??2@YAPAXI@Z
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ