DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
570bfb6d34105bc19279284207a038b982e474007f7ae0affb63b287ff1e2a8a.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
570bfb6d34105bc19279284207a038b982e474007f7ae0affb63b287ff1e2a8a.dll
Resource
win10v2004-20230220-en
Target
570bfb6d34105bc19279284207a038b982e474007f7ae0affb63b287ff1e2a8a
Size
256KB
MD5
1059ce9b8a558fc7b33b96bf94b56d04
SHA1
ea069adf5d63e9d1a524c2eafb34b837ddd57aed
SHA256
570bfb6d34105bc19279284207a038b982e474007f7ae0affb63b287ff1e2a8a
SHA512
3bf2e50bb7856a998967e0701aaf60c3ce5ef6e66f3a25edadb1d974c45ff262b84197e7ee7eda1b8673ac743f622c2cb9ace40cebe9ea6ccceea563ddad0106
SSDEEP
3072:a6N3XvNSotwO6iVIHAPsvQO1N5La1V9HD5/XRewMP3f5vmp3IlTtW:a6N3X9ogkvd1zLKjNXRKP3d63WTtW
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PathIsRelativeA
ord4003
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord3262
ord3081
ord3738
ord561
ord924
ord535
ord2764
ord4622
ord1223
ord290
ord6877
ord2915
ord4204
ord743
ord446
ord2486
ord4226
ord861
ord939
ord941
ord4129
ord540
ord860
ord922
ord858
ord537
ord823
ord2818
ord1601
ord800
ord825
ord815
ord2623
ord1206
ord614
ord4424
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord2985
ord3136
ord4465
ord3259
ord3147
ord2982
ord1799
ord859
ord940
ord1116
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord6467
ord1871
ord6354
ord1131
ord1132
ord5500
ord269
ord826
ord600
ord1578
memmove
strtol
_mbscmp
_ftol
sscanf
__CxxFrameHandler
strrchr
strchr
wcstombs
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
__RTDynamicCast
wcslen
atoi
sprintf
malloc
free
GetTempPathA
GetPrivateProfileStringA
GetModuleFileNameA
IsDebuggerPresent
LocalAlloc
LocalFree
GetEnvironmentVariableA
TlsGetValue
lstrlenA
lstrcpynA
MulDiv
Sleep
MultiByteToWideChar
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
LoadLibraryA
GetProcAddress
FreeLibrary
WritePrivateProfileStringA
GetLongPathNameA
OutputDebugStringA
GetSystemMetrics
ClientToScreen
GetWindowRect
GetWindowDC
IsRectEmpty
PostMessageA
ReleaseDC
LoadImageA
MapVirtualKeyA
GetDC
SetTextColor
SetBkColor
TextOutW
GetTextExtentPointW
GetPixel
GetBitmapBits
GetDeviceCaps
GetStockObject
SelectPalette
RealizePalette
CreateFontIndirectA
DeleteObject
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetObjectA
GetDIBits
DPtoLP
DeleteDC
CLSIDFromProgID
CoCreateInstance
CoTaskMemFree
StringFromCLSID
VariantCopy
SysAllocString
VariantClear
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEPADXZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PAD0PBD1@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
RegSetValueExA
RegCloseKey
RegOpenKeyA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ