DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
StartW
Static task
static1
Behavioral task
behavioral1
Sample
3a92c47578cabae4aee81275f5e6588676503d0cdef763557c312701960318f3.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3a92c47578cabae4aee81275f5e6588676503d0cdef763557c312701960318f3.dll
Resource
win10v2004-20221111-en
Target
3a92c47578cabae4aee81275f5e6588676503d0cdef763557c312701960318f3.zip
Size
168KB
MD5
d81e345af8edd53218d6ba3990002243
SHA1
e938b17638231acbdf6610f1bd5602d152268c83
SHA256
5a02fac3f0c41bb54f7f90493cd0fa3f5ffaa454430fe359b19c5aae8e8905c8
SHA512
1cb6b070a94033e7dfdd59f2dbe7a1fa9b50bf2418527d7666a91804215a6d36759cb8008fd1aa4635396523ed5664d274a5167258fd199af7c62ab54988bc6e
SSDEEP
3072:w2W5boV0OASbMc7C5IWm8zTpXTOc0hro0Uz60xNSHa6h9sgRqDT6u1wgizV:6hoGcb37C5fm8XpjO/hroxeusHa6h9KU
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
CloseHandle
ConnectNamedPipe
CreateFileA
CreateNamedPipeA
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapCreate
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
ReadFile
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WriteFile
_amsg_exit
_initterm
_iob
_lock
_unlock
abort
calloc
free
fwrite
malloc
realloc
sprintf
strlen
strncmp
vfprintf
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
StartW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ