CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
fa2745d2c6de7d276abb0be6fb46f633e8bad6a275e087708a5a63736dbf050c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fa2745d2c6de7d276abb0be6fb46f633e8bad6a275e087708a5a63736dbf050c.dll
Resource
win10v2004-20220901-en
Target
fa2745d2c6de7d276abb0be6fb46f633e8bad6a275e087708a5a63736dbf050c
Size
93KB
MD5
ebb56a8fd6d8a8968d88d9da90176053
SHA1
b25b6bfa214dec9aa4ca02016d54f683a26b14dd
SHA256
fa2745d2c6de7d276abb0be6fb46f633e8bad6a275e087708a5a63736dbf050c
SHA512
1a0a27dc290cf9a3094779a3dd0fa46eba988a22039dbf3389e0ce28d7df8d7f097e88b0c4151a8ffab0e71fc91a38fd58d541acb24d0222ffd9e384fd57aab7
SSDEEP
1536:IHqHmHfjz+C5ij1Xop0ttuw4GguTw2L7+3CpwxvabnVqCzUEtJ2+Db4a2360E:gqHmHbqRYm4G5TLL7CzcbVtzUEtDk369
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WritePrivateProfileStringA
GetWindowsDirectoryA
IsBadStringPtrW
GetPrivateProfileStringA
DeleteFileA
GetTempPathA
CreateFileMappingA
GetFileAttributesW
ReadProcessMemory
VirtualQueryEx
WideCharToMultiByte
ReadFile
GetFileSize
CreateFileA
GetModuleFileNameA
GetModuleHandleA
SetFilePointer
OpenProcess
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualFree
OutputDebugStringA
TerminateProcess
GetCurrentProcess
IsBadReadPtr
Sleep
GetCurrentThreadId
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
GetProcAddress
LoadLibraryA
FreeLibrary
wsprintfA
GetDC
GetWindowRect
wvsprintfA
GetWindow
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetClassNameW
FindWindowA
GetKeyboardState
ToAscii
GetWindowThreadProcessId
AttachThreadInput
GetFocus
InternetCloseHandle
DeleteUrlCacheEntry
URLDownloadToFileA
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
wcscpy
wcsncat
wcslen
time
exit
printf
malloc
_stricmp
srand
rand
strstr
strrchr
sprintf
tolower
_strcmpi
_vsnprintf
_ltoa
_strupr
wcsstr
??3@YAXPAX@Z
wcscmp
??2@YAPAXI@Z
fclose
ftell
fseek
fopen
mbstowcs
_except_handler3
strlen
strcpy
memset
memcpy
free
strncpy
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE