DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7314758132188ee3f7c88ff5fce659e35c37bd47aa04a6a575f9708bbc173a4a.dll
Resource
win7-20221111-en
Target
7314758132188ee3f7c88ff5fce659e35c37bd47aa04a6a575f9708bbc173a4a
Size
52KB
MD5
c7bfa75499e500f68c6490c1d10944e0
SHA1
837c9945d3c0cc9d3930a756a3a7e2ffc54808b4
SHA256
7314758132188ee3f7c88ff5fce659e35c37bd47aa04a6a575f9708bbc173a4a
SHA512
76a0a753900d896a56e5b022fbf3a0bc8f308bcbbb124f8b79fc5afaaee00ea6699e3b4a95720143d5584d4ac85e7aa0c034d025d278911960e593400dd65f8d
SSDEEP
1536:zRbY9AxEB3aJ0mzfDE+isMoEhLXOh1NesM:piv0GLy1Ne
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WritePrivateProfileStringA
CreateDirectoryA
GetModuleFileNameA
CreateThread
GetProcAddress
LoadLibraryA
ExitProcess
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
FreeLibrary
lstrlenA
RemoveDirectoryA
GetCurrentProcessId
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
LocalFree
GetCommandLineW
MultiByteToWideChar
SetFileAttributesA
MoveFileA
Sleep
FindFirstFileA
GetPrivateProfileStringA
DeleteFileA
FindNextFileA
EnterCriticalSection
LeaveCriticalSection
lstrlenW
WideCharToMultiByte
Process32First
CloseHandle
Process32Next
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strrchr
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_purecall
memcpy
strcmp
memcmp
fopen
fseek
ftell
fread
fclose
wcsstr
_wcslwr
atoi
strchr
sprintf
strcpy
strlen
??3@YAXPAX@Z
strstr
??2@YAPAXI@Z
_strupr
strncpy
memset
strncmp
_access
strcat
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ