DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c01411febfa095aed59a768f83ef3a7f7df99602cc77765ceb8b1f9409d346d4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c01411febfa095aed59a768f83ef3a7f7df99602cc77765ceb8b1f9409d346d4.dll
Resource
win10v2004-20220901-en
Target
c01411febfa095aed59a768f83ef3a7f7df99602cc77765ceb8b1f9409d346d4
Size
76KB
MD5
35caa6078a920815818dafee199b3c1d
SHA1
45e438a75b369832d6e136bb7c61ac1f535c7f78
SHA256
c01411febfa095aed59a768f83ef3a7f7df99602cc77765ceb8b1f9409d346d4
SHA512
5e2cf4e06263a8b56282e826cd77568c271f51418aaba90cb8ca68fcbc8b24852cb62eac912defd3d26b2fb942e1db87c5964d7e41057e303d1e7cf040ef9e68
SSDEEP
1536:U/o/OSVVTycwz5MGU+K+NijFXplgVcDo3SY:D/o1RU+gFXpSVc83S
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord3953
ord2725
ord5300
ord823
ord3663
ord5450
ord6394
ord5440
ord6383
ord465
ord5829
ord1113
ord1114
ord1116
ord1176
ord1575
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord825
ord6467
ord860
ord858
ord403
ord1643
ord273
ord603
ord703
ord6143
ord533
ord5194
ord5465
ord6282
ord6283
ord6883
ord1997
ord798
ord537
ord4204
ord2764
ord535
ord2915
ord5572
ord540
ord800
ord801
ord541
ord1168
??1type_info@@UAE@XZ
_CxxThrowException
memset
__CxxFrameHandler
_EH_prolog
_beginthreadex
rand
srand
strlen
strcat
memcpy
strcmp
_purecall
sprintf
memcmp
memmove
_mbscmp
_except_handler3
?terminate@@YAXXZ
__dllonexit
_onexit
free
_initterm
malloc
_adjust_fdiv
FreeLibrary
GetModuleFileNameA
GetShortPathNameA
HeapDestroy
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
lstrlenA
lstrcatA
GetSystemDirectoryA
Sleep
lstrlenW
WideCharToMultiByte
lstrcpyA
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
LoadLibraryA
CreateThread
MapViewOfFile
GetLastError
CreateFileMappingA
OpenFileMappingA
MultiByteToWideChar
GetTickCount
LocalFree
CallWindowProcA
GetWindowLongA
SetWindowLongA
GetWindowTextLengthA
wsprintfA
LoadCursorA
DefWindowProcA
SetTimer
SetWindowPos
MapWindowPoints
SystemParametersInfoA
GetWindow
GetParent
CharNextA
SetWindowsHookExA
GetClassNameA
CallNextHookEx
GetClientRect
DestroyWindow
GetClassInfoExA
RegisterClassExA
CreateWindowExA
MoveWindow
KillTimer
LoadMenuA
LoadIconA
SendMessageA
MessageBoxA
GetWindowRect
GetMenuState
CheckMenuItem
GetWindowTextA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
ord2
ord6
CreateToolbarEx
CoRegisterClassObject
CoDisconnectObject
CoCreateInstance
CoInitialize
RegisterTypeLi
VariantInit
SysStringLen
LoadRegTypeLi
LoadTypeLi
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
URLDownloadToFileA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ