DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
46982e549101718450d5cfd912a62ee9e0d7896173adac525194081e40aea106.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
46982e549101718450d5cfd912a62ee9e0d7896173adac525194081e40aea106.dll
Resource
win10v2004-20220901-en
Target
8511286469.zip
Size
82KB
MD5
444db39fea5271507471e568ea620cb1
SHA1
8c273367573ff366db5ab99e97db08898e6aa8c1
SHA256
dcd083b718deb3bb40663f807ca2b0d258422d78fb46f22cbd5272cfb4e5077f
SHA512
4e4e4613c8b0cac39fa205a8ee5d6c99eaac9e41efba7b271ddcc25a7803ffa4693b597c0c4432e1c5ce80bc29e5e75e22afc8db03ca0a965d036387769f8002
SSDEEP
1536:N0wr0rApDeA6Vp4XILStMk7Gl7RtjWSYY2cu2dQfO/eKe2fqicpF79RdDm:NZAWDerb4XILSCkErWxY2EdfGKe2/cpu
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WTSEnumerateSessionsA
MoveFileExW
ExitProcess
lstrcpyW
WriteFile
GetTempPathW
lstrlenA
CreateFileW
GetFileAttributesW
lstrcatA
GetLastError
MoveFileExA
DeleteFileA
DeleteFileW
CloseHandle
CreateThread
Sleep
GetTempFileNameW
VirtualFree
VirtualAlloc
SetErrorMode
SetFilePointer
lstrcpyA
lstrcpynA
GetTickCount
SetFileAttributesW
HeapFree
SetLastError
GetProcessHeap
FreeLibrary
IsBadReadPtr
GetModuleFileNameA
GetCurrentProcess
CreateProcessW
GetModuleFileNameW
lstrlenW
LocalFree
lstrcatW
GetProcAddress
LoadLibraryA
lstrcmpA
LocalAlloc
SetFileAttributesA
VirtualProtect
RegSetValueExA
RegDeleteValueA
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
RegOpenKeyExW
RegOpenKeyExA
RegSetValueExW
RegQueryValueExA
RegCloseKey
RegDeleteValueW
CoUninitialize
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ