DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
cca2db45334af23201ca3f7b101c3aa62708e17ea56f60505017f64fe693f923.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cca2db45334af23201ca3f7b101c3aa62708e17ea56f60505017f64fe693f923.dll
Resource
win10v2004-20220812-en
Target
cca2db45334af23201ca3f7b101c3aa62708e17ea56f60505017f64fe693f923
Size
250KB
MD5
aeda225ffd43d0b3029046f672bee7fd
SHA1
029b1885129da2a5d268a136445b513bf6091e0a
SHA256
cca2db45334af23201ca3f7b101c3aa62708e17ea56f60505017f64fe693f923
SHA512
d13e04ab75b87886aa8af0980195a7f079ed4322eccb4f2ddf993d107b8c99be7952983d7f91a0aee265b73cdc71804760405b524955166aed637222e887f6ca
SSDEEP
3072:piNBQqCr2s+lAtcew7p4KulAupBL3pf7pedXHr7dw9h+hg1XlldQjmTn3ypbriQf:poQqCr384Vlvpdxp4Zw9hS+dT6riQf
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SHDeleteKeyA
ord3830
ord3353
ord2976
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord540
ord800
ord860
ord4202
ord2764
ord354
ord5186
ord1979
ord665
ord823
ord825
ord537
ord925
ord858
ord535
ord6663
ord4278
ord2915
ord539
ord861
ord941
ord3831
ord4129
ord924
ord2763
ord4277
ord6877
ord922
ord939
ord926
ord3825
ord3079
ord4080
ord4622
ord4424
ord3579
ord2486
ord6876
ord923
ord5710
ord690
ord1988
ord3318
ord2803
ord5207
ord389
ord1158
ord536
ord6143
ord5608
ord6883
ord1200
ord6467
ord1154
ord1601
ord940
ord6648
ord5442
ord6385
ord5773
ord353
ord4204
ord859
ord5683
ord1105
ord6662
ord2818
ord6779
ord614
ord290
ord801
ord772
ord500
ord541
ord6778
memcmp
_mbscmp
_adjust_fdiv
_initterm
_wcsicmp
_strcmpi
_CxxThrowException
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
malloc
free
sprintf
atoi
time
localtime
asctime
fputs
fopen
fclose
rename
atof
srand
__CxxFrameHandler
rand
realloc
_onexit
__dllonexit
printf
strstr
LocalFree
InterlockedIncrement
MulDiv
GetVersionExA
GetLocaleInfoA
GetVersion
FreeLibrary
lstrcmpA
lstrcatA
GetProcAddress
LoadLibraryA
WriteFile
MultiByteToWideChar
CreateProcessA
CreateThread
ResumeThread
OpenFile
ReadFile
GetFileSize
CreateFileA
GetWindowsDirectoryA
ExpandEnvironmentStringsA
CopyFileA
GetSystemDirectoryA
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
TerminateProcess
GetExitCodeProcess
CloseHandle
FindFirstFileA
FindNextFileA
Sleep
GetLastError
lstrcpynA
lstrcpyA
lstrlenA
InterlockedDecrement
WideCharToMultiByte
GetModuleFileNameA
DeleteFileA
GetSystemMetrics
wsprintfA
DialogBoxParamA
GetDesktopWindow
GetCursorPos
GetWindowDC
FindWindowExA
MessageBoxW
IsCharAlphaNumericA
ScreenToClient
ClientToScreen
GetWindowRect
ReleaseDC
GetDC
SetWindowPos
MessageBoxA
GetWindowThreadProcessId
IsChild
WaitForInputIdle
SetFocus
GetForegroundWindow
EnumWindows
PostMessageA
GetParent
IsWindow
EnableWindow
SetForegroundWindow
SetWindowLongA
CallWindowProcA
SendMessageA
EndDialog
GetDlgItemTextA
SetWindowTextA
SetDlgItemTextA
GetDlgItem
ShowWindow
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
SetTextColor
SetBkColor
CreateSolidBrush
CreateFontA
GetDeviceCaps
SetPixel
DeleteObject
SelectObject
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
LookupPrivilegeValueA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueExA
ShellExecuteA
ord252
CoUninitialize
CoCreateInstance
CoInitialize
SysFreeString
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysStringByteLen
SafeArrayCreateVector
SafeArrayUnaccessData
SafeArrayAccessData
VariantCopy
OleLoadPicturePath
OleSavePictureFile
SysAllocString
GetErrorInfo
VariantInit
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
FtpCreateDirectoryA
FtpOpenFileA
FtpFindFirstFileA
InternetWriteFile
InternetFindNextFileA
DeleteUrlCacheEntry
FindCloseUrlCache
InternetReadFile
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
WSACleanup
gethostbyname
WSAStartup
inet_ntoa
CertCloseStore
CertOpenSystemStoreA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ