DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c255a6a8548efe02542a4d732c89d81728a024182b88947c836510529a634031.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c255a6a8548efe02542a4d732c89d81728a024182b88947c836510529a634031.dll
Resource
win10v2004-20220901-en
Target
c255a6a8548efe02542a4d732c89d81728a024182b88947c836510529a634031
Size
326KB
MD5
43ccaf288fb76b72a1d8bf48132a7c30
SHA1
d47e7171129b2cfd587aa942245f42394b2071c9
SHA256
c255a6a8548efe02542a4d732c89d81728a024182b88947c836510529a634031
SHA512
0c43ef0ef3e28f6dfc0fb8bc218e529c6a71a07ebe09a1744be48810a3d0170417f20e4c8ad07a94ab05ac5b7d488be71b3f00f70ecbd77404f77ed740568d44
SSDEEP
6144:EpTw+w7bpxWkBoSyatCAM0EMv9tZAyMnndE3Fqq:QRgbVmPCHmE3FZ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHDeleteKeyA
ord540
ord800
ord860
ord4202
ord2764
ord825
ord823
ord539
ord858
ord535
ord537
ord1105
ord6648
ord5683
ord926
ord4277
ord6779
ord6877
ord541
ord500
ord772
ord801
ord2763
ord4129
ord924
ord939
ord941
ord5186
ord354
ord1168
ord798
ord1997
ord6407
ord532
ord5442
ord5773
ord859
ord923
ord1200
ord925
ord4204
ord5710
ord690
ord665
ord1988
ord1979
ord3318
ord2803
ord6385
ord353
ord5207
ord389
ord6876
ord922
ord6778
ord6663
ord536
ord6883
ord6662
ord6143
ord5608
ord861
ord940
ord1158
ord2915
ord2818
ord4278
fputs
asctime
localtime
__CxxFrameHandler
??1type_info@@UAE@XZ
_wcsicmp
_strcmpi
memcpy
memset
_CxxThrowException
free
_mbscmp
time
rand
sprintf
_mbsnbcpy
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
fopen
_initterm
_adjust_fdiv
srand
realloc
malloc
atof
atoi
rename
printf
strstr
fclose
LocalFree
MulDiv
FindClose
GetFileAttributesA
WaitForSingleObject
FindResourceA
LoadResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
FindFirstFileA
FindNextFileA
ExpandEnvironmentStringsA
GetVersionExA
GetFileSize
ReadFile
lstrcmpA
FreeLibrary
lstrcpynA
lstrcpyA
lstrcatA
GetVersion
OpenFile
CreateThread
ResumeThread
LoadLibraryA
GetProcAddress
CreateFileA
WriteFile
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetExitCodeProcess
TerminateProcess
CloseHandle
CopyFileA
GetCurrentProcess
GetLastError
GetWindowsDirectoryA
GetSystemDirectoryA
GetLocaleInfoA
DeleteFileA
MultiByteToWideChar
lstrlenA
Sleep
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
DeviceIoControl
wsprintfA
SetWindowLongA
EnableWindow
SetForegroundWindow
ShowWindow
SetDlgItemTextA
ReleaseDC
ScreenToClient
ClientToScreen
GetCursorPos
GetDesktopWindow
GetWindowRect
SetWindowPos
GetWindowDC
CallWindowProcA
SetWindowTextA
DialogBoxParamA
GetParent
PostMessageA
GetDC
GetDlgItem
EndDialog
GetDlgItemTextA
GetSystemMetrics
CharToOemA
FindWindowExA
IsCharAlphaNumericA
IsWindow
SendMessageA
MessageBoxA
MessageBoxW
CreateCompatibleBitmap
SelectObject
SetPixel
DeleteObject
SetBkColor
SetTextColor
CreateSolidBrush
CreateFontA
BitBlt
CreateCompatibleDC
GetDeviceCaps
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
ShellExecuteExA
ShellExecuteA
ord252
ord251
CoCreateInstance
CoCreateGuid
StringFromGUID2
CoInitialize
CreateStreamOnHGlobal
VariantClear
SysFreeString
VariantCopy
SysAllocString
SysAllocStringLen
SafeArrayCreate
SysAllocStringByteLen
SysStringByteLen
OleSavePictureFile
OleLoadPicturePath
VariantInit
GetErrorInfo
HttpQueryInfoA
InternetFindNextFileA
InternetOpenUrlA
FtpFindFirstFileA
FtpOpenFileA
InternetWriteFile
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
FindCloseUrlCache
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetCloseHandle
FindNextUrlCacheEntryA
FtpCreateDirectoryA
WSACleanup
WSAStartup
gethostbyname
inet_ntoa
CertOpenSystemStoreA
CertCloseStore
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ