DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4a3f719a6d2b6d54e1ed711198c4905ad33fb473e66767cc4bed976424611437.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a3f719a6d2b6d54e1ed711198c4905ad33fb473e66767cc4bed976424611437.dll
Resource
win10v2004-20220812-en
Target
4a3f719a6d2b6d54e1ed711198c4905ad33fb473e66767cc4bed976424611437
Size
315KB
MD5
309a6b21816cd94fe410bf0181525440
SHA1
200d7d39d8fca31ed18f19c45946588ccb95f509
SHA256
4a3f719a6d2b6d54e1ed711198c4905ad33fb473e66767cc4bed976424611437
SHA512
c6ff22879ad566cc17c8390ab272f4836a2c48db44b1a6df5c9c063fa22c9ee5a305083fcbee58b509c917f3afadf3a6e8cf484e80590e274f2fd463366dc08f
SSDEEP
6144:5+9JrUS0oFZ9ES6RSRHsvfjp8PYLeB8l9gqXrC:5+DrUY3eMRHsH2mi8l9gqXr
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
getservbyname
htons
gethostbyname
WSAGetLastError
inet_ntoa
htonl
gethostbyaddr
ntohs
getservbyport
WSASetLastError
WSACleanup
closesocket
recv
shutdown
WSAStartup
socket
setsockopt
ioctlsocket
connect
select
__WSAFDIsSet
send
inet_addr
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
Sleep
InterlockedExchange
FreeLibrary
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
HeapFree
VirtualAlloc
HeapAlloc
GetProcessHeap
GetLastError
ReadFile
SetFilePointer
GetFileSize
GetFileTime
CreateFileA
WideCharToMultiByte
CreateFileW
VirtualFree
CloseHandle
lstrlenW
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
GetModuleFileNameW
MultiByteToWideChar
LoadLibraryExW
GetModuleHandleW
SetThreadLocale
GetThreadLocale
FormatMessageA
HeapReAlloc
HeapCreate
HeapDestroy
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
LCMapStringW
LCMapStringA
VirtualQuery
ExitProcess
GetModuleFileNameA
GetConsoleCP
GetConsoleMode
SetStdHandle
GetStdHandle
WriteFile
SetLastError
TlsFree
TlsSetValue
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RtlUnwind
GetCommandLineA
GetCurrentThreadId
HeapSize
GetLocaleInfoA
GetACP
GetTickCount
lstrlenA
GetVersionExA
TlsAlloc
TlsGetValue
GetModuleHandleA
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
FormatMessageW
GetOEMCP
inflate
inflateReset
inflateEnd
inflateInit_
Utf8ToUtf16
Utf16ToUtf8
UnregisterClassA
CharNextW
RegQueryValueExW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
CoTaskMemFree
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
SafeArrayCreate
SafeArrayAccessData
SafeArrayDestroy
SafeArrayUnaccessData
SysAllocStringLen
VariantChangeType
VariantClear
VariantInit
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
UuidToStringA
RpcStringFreeA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE