DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b03a55718208ad413bbd510f21e4f1bfb3514c44fc850b4b5bbc1770cee44997.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b03a55718208ad413bbd510f21e4f1bfb3514c44fc850b4b5bbc1770cee44997.dll
Resource
win10v2004-20221111-en
Target
b03a55718208ad413bbd510f21e4f1bfb3514c44fc850b4b5bbc1770cee44997
Size
44KB
MD5
0038c990e60579b200b6dbd40271c4d6
SHA1
6b6a259481211128d932d5464abe30fc86db0253
SHA256
b03a55718208ad413bbd510f21e4f1bfb3514c44fc850b4b5bbc1770cee44997
SHA512
ee9478c936d7e252e6e89518803eb0944734b68afbc30ae563f5d6798698f77c9bf52901681d5c97a4d7c367ff9602e78ccab22ebc29c2031fd00998a14ceb25
SSDEEP
768:LEaipkavr/cLG8bGw1tYQkObkk0UiPHXygLa15b:LN0/cLnbGwgQkOgk0JPLaD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetLastError
GetModuleFileNameA
InterlockedIncrement
CreateMutexA
GetSystemDirectoryA
GetLocalTime
WinExec
GetWindowsDirectoryA
LoadLibraryA
GetProcAddress
VirtualAlloc
CreateThread
CloseHandle
CreateProcessA
FindWindowExA
SetWindowsHookExA
ShowWindow
CreateWindowExA
PostMessageA
KillTimer
SetTimer
DefWindowProcA
RegisterClassExA
GetMessageA
TranslateMessage
UnhookWindowsHookEx
CallNextHookEx
DispatchMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
__CxxFrameHandler
_adjust_fdiv
malloc
_initterm
free
strchr
fopen
fwrite
fclose
_stricmp
_pctype
??2@YAPAXI@Z
_except_handler3
strrchr
sprintf
??3@YAXPAX@Z
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ