DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a841f51f7b11e188dce613886215bc6ab796d4552917f4104c2c275c3f994350.dll
Resource
win7-20221111-en
Target
a841f51f7b11e188dce613886215bc6ab796d4552917f4104c2c275c3f994350
Size
164KB
MD5
7b7076a0391eaf32b25d76cacd11c08d
SHA1
5e0b686bd73610544cd2c43c4dc14f80b545a41e
SHA256
a841f51f7b11e188dce613886215bc6ab796d4552917f4104c2c275c3f994350
SHA512
dc6cf706117fbb9941ee5ee77ee1e370dd810fc46fe425e297c52d3b69c4622fd013a49ca3bd59e888f1358a28d1fcc3a478ab535c57e6ac5e5e954fdc920ab4
SSDEEP
1536:EmTuHpYB0r03r1cxIfx92AGHx2UF4gDg26fYcijTH4yzgZr1uf54ywRrP9Er/il5:EmywxQAOVFrefYciLgt1uf54y2Er/i5
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpiW
lstrcpynW
MultiByteToWideChar
lstrlenA
SizeofResource
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
lstrcatW
ReadFile
CreateFileA
GetTempPathA
FlushFileBuffers
WriteFile
DeleteFileA
DeviceIoControl
WideCharToMultiByte
IsBadReadPtr
Module32NextW
Module32FirstW
InterlockedIncrement
GetModuleHandleA
WriteProcessMemory
GetCurrentProcess
VirtualProtect
Sleep
DebugBreak
SetErrorMode
OpenEventA
ExitProcess
GetFileSize
GetSystemDirectoryA
OutputDebugStringA
LoadLibraryA
ReadProcessMemory
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
CreateThread
GetTickCount
LocalFree
InterlockedDecrement
LoadLibraryW
GetProcAddress
FreeLibrary
lstrcpyW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
DeleteCriticalSection
HeapDestroy
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
GetModuleFileNameW
GetModuleHandleW
GetShortPathNameW
GetCurrentProcessId
lstrlenW
MessageBoxW
CharLowerW
wsprintfA
SetWindowLongW
CharNextW
RegCreateKeyExA
RegFlushKey
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
RegDeleteValueA
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegSetValueExA
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
VariantClear
SysAllocStringLen
LoadTypeLi
SysAllocString
VarUI4FromStr
LoadRegTypeLi
SysStringLen
RegisterTypeLi
SysFreeString
strncpy
_CxxThrowException
_strlwr
_stricmp
_adjust_fdiv
_initterm
_onexit
__dllonexit
strrchr
abort
atoi
wcscpy
??1type_info@@UAE@XZ
strlen
strchr
strcmp
strstr
sprintf
_wcslwr
free
_wcsicmp
memset
??3@YAXPAX@Z
memcpy
memcmp
_purecall
??2@YAPAXI@Z
malloc
realloc
strcat
strcpy
wcslen
wcsstr
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
connect
ioctlsocket
htons
inet_ntoa
select
send
recv
__WSAFDIsSet
WSACleanup
WSAStartup
gethostbyname
closesocket
socket
shutdown
inet_addr
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ