DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0a83ab3554a960622a32a677202273bfc15a15eb9a250c4f3975df8fb6f3cd3c.dll
Resource
win7-20220812-en
Target
0a83ab3554a960622a32a677202273bfc15a15eb9a250c4f3975df8fb6f3cd3c
Size
256KB
MD5
4d2ba4791ec8ab0afd99adf82aec3130
SHA1
0ec87d1d5537d305ee1e4151febf0877a7be70bf
SHA256
0a83ab3554a960622a32a677202273bfc15a15eb9a250c4f3975df8fb6f3cd3c
SHA512
30fc0670a44dd9e60b40c4180ba3426be7e9c267c9ceea128332bca10bb343e9ea73a16353ed977c1e99bc41c492b6f8a1517244b14e203cd5ff923ac0afb1e3
SSDEEP
1536:q8c/hKvVXjOAxXOcQ2UI4c3GLdDqj0RrkX1yUyz9Hxn9hLUjpgzP:YhKvBKAxecQgunZs1yUyznH6gzP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
lstrcmpiW
MultiByteToWideChar
lstrlenA
SizeofResource
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
lstrcpynW
lstrcpyW
lstrcatW
GetLocalTime
Sleep
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetCurrentProcess
ReadFile
CreateFileA
GetTempPathA
FlushFileBuffers
WriteFile
DeleteFileA
DeviceIoControl
WideCharToMultiByte
GetModuleFileNameW
IsBadReadPtr
GetTickCount
Module32NextW
Module32FirstW
GetCurrentProcessId
DebugBreak
SetErrorMode
OpenEventA
ExitProcess
ReadProcessMemory
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
IsBadCodePtr
SetUnhandledExceptionFilter
RaiseException
LocalFree
GetModuleHandleW
GetShortPathNameW
lstrlenW
InterlockedDecrement
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
ExitThread
CreateThread
InitializeCriticalSection
DisableThreadLibraryCalls
DeleteCriticalSection
HeapDestroy
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCPInfoExW
CloseHandle
GetACP
OutputDebugStringA
wsprintfW
CharLowerW
CharNextW
wsprintfA
SetWindowLongW
MessageBoxW
RegOpenKeyExA
RegDeleteKeyA
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
VariantInit
VariantClear
SysAllocStringLen
LoadRegTypeLi
SysStringLen
LoadTypeLi
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
wcsncmp
_stricmp
_adjust_fdiv
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
strrchr
abort
_strlwr
wcsncpy
time
srand
atoi
wcscpy
strncpy
strchr
strstr
sprintf
_wcslwr
_wcsicmp
??3@YAXPAX@Z
_purecall
??2@YAPAXI@Z
__CxxFrameHandler
free
malloc
realloc
wcslen
wcsstr
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ