DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a25c3274abce2e430877e3a758f68cb9d1819593c16c6fc89d55d347d81f8466.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a25c3274abce2e430877e3a758f68cb9d1819593c16c6fc89d55d347d81f8466.dll
Resource
win10v2004-20220901-en
Target
a25c3274abce2e430877e3a758f68cb9d1819593c16c6fc89d55d347d81f8466
Size
308KB
MD5
b4c837f1635913ad45c295d3e54d07a9
SHA1
872a6158507355d367b459e4a96c26caa148ed1c
SHA256
a25c3274abce2e430877e3a758f68cb9d1819593c16c6fc89d55d347d81f8466
SHA512
2ed3d85c46eca4b789444a957bf33b9b40197320a0b102d5f091024e4d7e6901350208c2193b16f48a51c803cd325772a28c864f390ab314c53d04459c2f3f9f
SSDEEP
3072:gaGRA6yi6HF94Q6Nx1elM659yt2CJzDuuXJOIZJ0V+di+h6ZZgu0GdJWgtIIlb:7iyi6HuLwtc2CP02nEZgu0Gugtnlb
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Module32Next
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
CreateThread
GetLastError
SetLastError
TerminateThread
DisableThreadLibraryCalls
GetTickCount
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
CopyFileA
ReadFile
LocalFree
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
CreateProcessA
GetLocalTime
GetCurrentProcessId
SetFilePointer
lstrlenW
WriteFile
GetFileSize
CloseHandle
GetSystemDirectoryA
Sleep
LoadLibraryA
FreeLibrary
CreateFileA
GetVersionExA
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetVersion
GetEnvironmentVariableA
GetModuleFileNameA
OutputDebugStringA
DebugBreak
InterlockedDecrement
CreateDirectoryA
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
lstrlenA
DeleteFileA
EnterCriticalSection
CharNextA
wvsprintfA
LoadStringA
wsprintfA
GetSystemMetrics
CallNextHookEx
GetClassNameA
KillTimer
CharLowerA
UnhookWindowsHookEx
SetTimer
wsprintfW
GetParent
SendMessageTimeoutA
RegisterWindowMessageA
DestroyWindow
SendMessageA
SetWindowsHookExA
GetActiveWindow
ShowWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
SetActiveWindow
SetForegroundWindow
SetFocus
BringWindowToTop
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextA
RegEnumKeyExA
RegQueryInfoKeyA
SHGetSpecialFolderPathA
CoInitialize
CoCreateInstance
SysFreeString
SysAllocString
LoadRegTypeLi
SysStringLen
VariantClear
VariantChangeType
VariantCopy
SysAllocStringLen
ord31
ord30
ord58
ord32
ord57
ord15
ord16
ord21
ord23
??_7out_of_range@std@@6B@
??0logic_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@IIABV?$allocator@D@1@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??9std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??8std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIPBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?_Xran@std@@YAXXZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??_D?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?str@?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??0?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
URLDownloadToFileA
InternetAttemptConnect
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
HttpQueryInfoA
InternetReadFile
InternetCrackUrlA
InternetOpenUrlA
InternetConnectA
Netbios
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
atoi
strlen
atol
_stricmp
time
strcmp
??2@YAPAXI@Z
_mbscmp
localtime
strstr
_except_handler3
_CxxThrowException
memcpy
_ismbcspace
memmove
_mbsstr
_mbschr
??0exception@@QAE@ABV0@@Z
_ismbcdigit
_mbsicmp
_mbsnbcpy
_mbsrchr
strcpy
memset
__CxxFrameHandler
strcat
_mbslwr
_itoa
sprintf
_purecall
memcmp
rand
srand
_local_unwind2
strncpy
free
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
malloc
_adjust_fdiv
wcslen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ