DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b34b222f39ebf744509693d2c64726bc2b798e930da965d7494744dc92f1ba28.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b34b222f39ebf744509693d2c64726bc2b798e930da965d7494744dc92f1ba28.dll
Resource
win10v2004-20221111-en
Target
b34b222f39ebf744509693d2c64726bc2b798e930da965d7494744dc92f1ba28
Size
48KB
MD5
69a2f5be7abf1326c236a518d1367c71
SHA1
4480b33c8fad964a60241da851e1b170a76f5135
SHA256
b34b222f39ebf744509693d2c64726bc2b798e930da965d7494744dc92f1ba28
SHA512
af74abc2fc5d6f91565bc240a80f49146e0bde328f51c56349da58ef18bc5155db4904ac99ef037b0b5ceae699ead657de66b9267c457407a1146b94973ac5ac
SSDEEP
768:m4iZTK++QjZYEShg0HpnG3cBSv6WvU48TZS59USdcXQP8pR7y+:cZGZKzB0HlbBSv6Ws48s59USmXDX7
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetSystemDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetWindowsDirectoryA
DeleteFileA
WritePrivateProfileStringA
CloseHandle
GetLastError
CreateEventA
GetCurrentProcessId
GetLocalTime
GetCommandLineW
Process32Next
Process32First
lstrlenA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
CreateThread
Sleep
LoadLibraryA
GetModuleFileNameA
GetProcAddress
SetWindowTextA
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
SetTimer
PostMessageA
DefWindowProcA
CallNextHookEx
IsWindow
CreateWindowExA
ShowWindow
FindWindowExA
RegisterClassExA
KillTimer
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
strrchr
_access
_stricmp
memcmp
memset
_purecall
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
_strlwr
strcat
strchr
fopen
fwrite
fclose
strcpy
strstr
strcmp
??3@YAXPAX@Z
sprintf
rand
memcpy
strlen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ