DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d2f9278552d1306b8f09042e593bbfee907be1852041b85a8e3ab4a097dd6cfa.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d2f9278552d1306b8f09042e593bbfee907be1852041b85a8e3ab4a097dd6cfa.dll
Resource
win10v2004-20220812-en
Target
d2f9278552d1306b8f09042e593bbfee907be1852041b85a8e3ab4a097dd6cfa
Size
13KB
MD5
0ecf8a006786774ec2042cedeb2f52c0
SHA1
383a45ef71dbaf88e5b554df7b506de6e40d0b5c
SHA256
d2f9278552d1306b8f09042e593bbfee907be1852041b85a8e3ab4a097dd6cfa
SHA512
f3bcfcdc854808190dff73d27378aff2698076a890accc430e1696c427b1b2cd3d24650437cb83ee59d5e563721410122f1ec2f905c35939586808e4e2829380
SSDEEP
192:emh5pteEmOGEqVS0qndheg9IZ/5+L6yzGDWTobOlYVoGFua/Bhi6ep:e0estj08S5+bzGDWT+OfGFt
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
rand
srand
strtok
ispunct
isprint
fopen
fwrite
sprintf
memset
islower
isgraph
isdigit
isalpha
isalnum
div
ceil
strncpy
atoi
??2@YAPAXI@Z
??3@YAXPAX@Z
fclose
tmpnam
free
malloc
_snprintf
_adjust_fdiv
_initterm
_stricmp
OutputDebugStringA
Sleep
GetModuleFileNameA
SleepEx
DisableThreadLibraryCalls
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetLocalTime
GetCurrentProcessId
GetSystemDirectoryA
DeleteFileA
CreateProcessA
WaitForSingleObject
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
MoveFileExA
DeleteFileW
wsprintfA
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
KillTimer
SetTimer
DefWindowProcA
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
SHGetSpecialFolderPathA
SHChangeNotify
SHGetSpecialFolderPathW
CoCreateInstance
CoInitialize
InternetSetOptionA
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
InternetOpenA
SHGetValueA
SHSetValueA
RpcStringFreeA
UuidCreate
UuidToStringA
Netbios
GetModuleBaseNameA
EnumProcesses
EnumProcessModules
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ