DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InstantAccess
P2EProc
Socksify
UnSocksify
Static task
static1
Behavioral task
behavioral1
Sample
b76283acee23e735c751db77f1279dd07f1353f54e2a092ce2e5e19dd7a2629f.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b76283acee23e735c751db77f1279dd07f1353f54e2a092ce2e5e19dd7a2629f.dll
Resource
win10v2004-20221111-en
Target
b76283acee23e735c751db77f1279dd07f1353f54e2a092ce2e5e19dd7a2629f
Size
172KB
MD5
7196d6308836aa1f4ea5dbb9155e5401
SHA1
4a9113d836a54293a5406619124e1b8ea336eb39
SHA256
b76283acee23e735c751db77f1279dd07f1353f54e2a092ce2e5e19dd7a2629f
SHA512
7ab5127287cb91a575fe345f7632115e3cb4a458ac752660db39841d9f4b1a93fc00fff2639a845b5b350de365e624d657976ef9bedd5a8484bb3da6b9c76a43
SSDEEP
3072:xvXOXr0b1gb6leFkgXHQOCq7qSdEnl3Fz3nDc+zzJumwQ:xQr0preFkgXzCqkc4UmwQ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateProcessA
FlushInstructionCache
lstrcmpA
VirtualProtect
GetCurrentProcess
FreeLibrary
LoadLibraryA
SetLastError
GetFileSize
GetLastError
CreateFileA
WriteFile
GlobalAlloc
Sleep
DeleteFileA
CopyFileA
LocalAlloc
CreateDirectoryA
SetFilePointer
FindNextFileA
FindFirstFileA
ReadFile
GlobalFree
GetModuleFileNameA
CreateThread
GetWindowsDirectoryA
SizeofResource
LoadResource
FindResourceA
TerminateProcess
OpenProcess
LockResource
GetVersionExA
GetProcAddress
TlsSetValue
TlsAlloc
ExitProcess
TlsFree
DisableThreadLibraryCalls
lstrlenW
CreatePipe
GetCurrentProcessId
CreateMutexA
OpenMutexA
DuplicateHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
CloseHandle
OutputDebugStringA
lstrcatA
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalFree
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
GetSystemDirectoryA
TerminateThread
SetDlgItemTextA
CharLowerA
GetOpenClipboardWindow
CloseClipboard
GetClipboardData
OpenClipboard
GetWindowThreadProcessId
EndDialog
KillTimer
DialogBoxParamA
GetWindowRect
GetSystemMetrics
FindWindowA
CharUpperBuffA
SetTimer
CharLowerBuffA
SetWindowPos
GetDC
SetWindowsHookExA
UnhookWindowsHookEx
GetDlgItem
PostMessageA
SetWindowLongA
CallNextHookEx
LoadCursorA
CopyIcon
CopyImage
SetSystemCursor
LoadStringA
CreatePopupMenu
InsertMenuA
GetWindowPlacement
GetCursorPos
GetForegroundWindow
TrackPopupMenu
DestroyMenu
SendMessageA
SetForegroundWindow
MessageBoxA
ShowWindow
SetWindowTextA
GetWindowLongA
SetParent
MoveWindow
LoadImageA
IsWindow
GetDlgItemTextA
GetDIBits
CreateFontA
GetObjectA
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
ShellExecuteA
Shell_NotifyIconA
SHChangeNotify
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
VariantClear
LoadRegTypeLi
SysFreeString
SysAllocStringLen
VariantInit
SysAllocString
SysStringLen
SysAllocStringByteLen
recv
connect
send
ntohs
getpeername
WSAConnect
socket
gethostbyname
WSAGetLastError
htons
getsockopt
select
closesocket
inet_addr
InternetSetOptionA
InternetConnectA
InternetGetConnectedState
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoA
InternetOpenA
ord10
ord11
ord30
ord58
ord32
ord23
ord21
ord16
ord15
ord18
ord57
ord52
ord53
URLOpenBlockingStreamA
GetAdaptersInfo
GetIfEntry
atol
_purecall
_CxxThrowException
_msize
memmove
_mbsinc
memset
_mbslwr
_mbschr
__CxxFrameHandler
wcslen
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
strcpy
_except_handler3
free
_mbsrchr
vsprintf
_mbclen
strlen
sprintf
_mbsnbcmp
_ismbcdigit
atoi
_mbscmp
fclose
fwrite
fopen
strrchr
strchr
realloc
time
strncmp
malloc
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_mbsstr
memcmp
__dllonexit
strstr
_onexit
?terminate@@YAXXZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InstantAccess
P2EProc
Socksify
UnSocksify
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ