DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ccedeed3c0c748893fdde3381d6b66d81cf5ea8bb6a8fa78f32bea14ea7b9164.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccedeed3c0c748893fdde3381d6b66d81cf5ea8bb6a8fa78f32bea14ea7b9164.dll
Resource
win10v2004-20221111-en
Target
ccedeed3c0c748893fdde3381d6b66d81cf5ea8bb6a8fa78f32bea14ea7b9164
Size
56KB
MD5
5e1457e7117ea67083dab106f2d10467
SHA1
2543ee052cb74961d0d855b9e3f9ed65f497b226
SHA256
ccedeed3c0c748893fdde3381d6b66d81cf5ea8bb6a8fa78f32bea14ea7b9164
SHA512
88b4ddfa6882c445dffca99c39a38df8e2901bc6e9bb6b381e8b1c1956c5365247a5d91e533a8474fd3e0e915b0e09753f06335d810cc4b77334cf62c09f1086
SSDEEP
384:h2upL5qeknw5DLq3otZlmhCsyQfXlICBJyeXMlOvZw7dfYWvPXiqukZFU91op74+:MYqf0dmhCslXlIYMlOR4d6Kzj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateToolhelp32Snapshot
WriteProcessMemory
VirtualProtectEx
OpenProcess
Module32Next
Module32First
WritePrivateProfileStringA
IsBadStringPtrA
GetCurrentDirectoryA
GetPrivateProfileStringA
GetProcAddress
GetTempPathA
VirtualAlloc
GetCurrentProcessId
lstrlenW
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
LoadLibraryA
VirtualProtect
DisableThreadLibraryCalls
GetCurrentProcess
TerminateProcess
CreateEventA
CreateThread
OpenEventA
SetEvent
CloseHandle
Sleep
GetModuleFileNameA
WinExec
GetWindowTextA
SetWindowsHookExA
EnumWindows
CallNextHookEx
wsprintfA
GetWindowThreadProcessId
RegSetValueExA
RegOpenKeyA
RegCloseKey
SysFreeString
SysStringLen
LoadRegTypeLi
_initterm
malloc
_adjust_fdiv
free
memmove
sprintf
isprint
strstr
_purecall
??3@YAXPAX@Z
_itoa
??2@YAPAXI@Z
strrchr
_strcmpi
ord16
ord21
ord15
ord23
ord18
ord57
ord58
ord30
ord32
StrStrIA
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ