DllCanUnloadNowW
DllRegisterServerW
DllUnregisterServerW
SmartStart
Static task
static1
Behavioral task
behavioral1
Sample
babb9781b59cc7a80ff5bb0cb9e9547e452b174240f4157a1e851ed2400c87ce.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
babb9781b59cc7a80ff5bb0cb9e9547e452b174240f4157a1e851ed2400c87ce.dll
Resource
win10v2004-20220812-en
Target
babb9781b59cc7a80ff5bb0cb9e9547e452b174240f4157a1e851ed2400c87ce
Size
33KB
MD5
eebe9995d4b572a307a64cf49bcbbdfc
SHA1
0daf640db7ad31d0b852867db97a987638daf4ad
SHA256
babb9781b59cc7a80ff5bb0cb9e9547e452b174240f4157a1e851ed2400c87ce
SHA512
8e7d60269de9b040519f3a46905780fbe0015f49a2d00c0c0108a49fb88da98b94cdc9ebd687c644d9840636efd3dc9507258cb962bb1ba0bcbaeafb7c4a656a
SSDEEP
384:fgpQ+LTB//5yswqwf28MhZPz6mKELOhq9n3QEuxY3jXkpzvl3c/cgMgH:fsJF35k5eL6uLR9AEP3jXktvlY
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
GetSystemDirectoryA
GetTempPathA
HeapAlloc
GetProcessHeap
SetEvent
DeleteFileA
WriteFile
CreateFileA
ReadFile
CreateEventA
ConnectNamedPipe
GetCurrentProcess
GetStartupInfoA
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
CreateNamedPipeA
CreateThread
WaitForSingleObject
TerminateThread
CloseHandle
DisconnectNamedPipe
HeapFree
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCPInfo
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
VirtualFree
VirtualAlloc
HeapReAlloc
RtlUnwind
TerminateProcess
GetStdHandle
wsprintfA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CreateProcessAsUserA
URLDownloadToFileA
InternetConnectA
HttpQueryInfoA
InternetReadFile
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
DllCanUnloadNowW
DllRegisterServerW
DllUnregisterServerW
SmartStart
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ