DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
faa8a5078cc3f5008d4087708a6c1ba95ffa19cc3b4e89eabc5283fbed57bf7b.dll
Resource
win7-20220812-en
Target
faa8a5078cc3f5008d4087708a6c1ba95ffa19cc3b4e89eabc5283fbed57bf7b
Size
52KB
MD5
7b5b018768b87e7edbd9d2ded7c93fd0
SHA1
1f20a869aec8b82860c32e58473d022b7fb7e335
SHA256
faa8a5078cc3f5008d4087708a6c1ba95ffa19cc3b4e89eabc5283fbed57bf7b
SHA512
c67bb2296c3f721d883b5c77d58c7ce85d1215a74bbd738ee4e878c8e655c56c1e123753dfc02f6666f01037f0fb1791c2d90020046f6fcf34035fad956f5371
SSDEEP
1536:Tg9KtdkKbPcY/Ik2r7OlBpdWFCgxsSCJ5TJ21WattAev9:Tg9KEePc+dTz5Battdv
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Process32Next
Process32First
FindNextFileA
DeleteFileA
GetPrivateProfileStringA
FindFirstFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
LocalFree
SetFileAttributesA
ExitProcess
CloseHandle
RemoveDirectoryA
WideCharToMultiByte
MoveFileA
CreateDirectoryA
WritePrivateProfileStringA
FreeLibrary
GetCommandLineW
CreateThread
LoadLibraryA
GetProcAddress
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
Sleep
DisableThreadLibraryCalls
GetCurrentProcessId
RegDeleteKeyA
RegQueryValueExA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
strrchr
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
strcmp
strncmp
strncpy
strchr
atoi
fopen
fseek
??3@YAXPAX@Z
memcpy
_purecall
??2@YAPAXI@Z
memcmp
strcpy
sprintf
memset
strlen
strstr
_strupr
strcat
_access
fclose
fread
ftell
SHDeleteValueA
SHSetValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ