DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
fe4bb3f53967e2f5ae15854e32e3bc55a23297a4024bc40919805ba004d69a29.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe4bb3f53967e2f5ae15854e32e3bc55a23297a4024bc40919805ba004d69a29.dll
Resource
win10v2004-20220812-en
Target
fe4bb3f53967e2f5ae15854e32e3bc55a23297a4024bc40919805ba004d69a29
Size
48KB
MD5
7af9c7d4f18587ad5304b92b175bbc41
SHA1
6d390f24c96f6a2bde1f3b100b8cbf782cba702e
SHA256
fe4bb3f53967e2f5ae15854e32e3bc55a23297a4024bc40919805ba004d69a29
SHA512
c3dc47748e38c68b3f69e3dba9004312a5254e9b97e96c0180ee97f17ec48e3582271b27759fb14e7f6479609ff7d94a009497954728b04201269a259745170e
SSDEEP
768:zlUfZemK9tdud2570ejUJidHEM+UZyBXZvfn+i7sOjokrdE91sEOUSnIC:Zqz4ud/xi+3X1f+iDJEDsPz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
CloseHandle
LoadLibraryA
GetCommandLineW
GetLocalTime
GetSystemInfo
WritePrivateProfileStringA
GetCurrentProcessId
GetProcAddress
Sleep
CreateThread
WideCharToMultiByte
Process32Next
Process32First
DeleteFileA
GetLastError
GetWindowsDirectoryA
GetSystemDirectoryA
CreateEventA
HeapAlloc
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
PostMessageA
DefWindowProcA
RegisterClassExA
CreateWindowExA
ShowWindow
TranslateMessage
DispatchMessageA
SetWindowTextA
SendMessageA
CallNextHookEx
KillTimer
SetTimer
IsWindow
FindWindowExA
GetMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
fopen
fwrite
_strlwr
fclose
strcmp
strcpy
strstr
free
_initterm
malloc
_adjust_fdiv
_stricmp
strchr
strcat
_access
strrchr
sprintf
rand
strlen
memcmp
memcpy
memset
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ