DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
e860784b08d48fb1362526c53464f40b07cfba05b3476f8cc1ad45d46d919d64.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e860784b08d48fb1362526c53464f40b07cfba05b3476f8cc1ad45d46d919d64.dll
Resource
win10v2004-20220812-en
Target
e860784b08d48fb1362526c53464f40b07cfba05b3476f8cc1ad45d46d919d64
Size
104KB
MD5
c0799c52ef39fcce5944bb2ea05db985
SHA1
ec33813275d4c23f4d81c6affb714b214db1fd10
SHA256
e860784b08d48fb1362526c53464f40b07cfba05b3476f8cc1ad45d46d919d64
SHA512
097a156eb063a3ef8b9fedbd0976e1a94ef4132a3b501f47cfba6013001d74bed6dd26fc644777814899a2f7e0b6f9d909cba459c5aed79db12f40c8db87e421
SSDEEP
1536:tI8TmqUj//EuCg6zNBIMpmAdMivn5i4V0pJSmC5wOHbSFtRP24e:tRaqUj/cg6RqWdMiP5kC5lSFtRP24e
resource | yara_rule |
---|---|
sample | upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrlenA
lstrcmpiA
lstrlenW
lstrcpyA
GetModuleHandleA
GetModuleFileNameA
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
CloseHandle
ReleaseMutex
lstrcpynA
IsDBCSLeadByte
SizeofResource
LockResource
GetStringTypeW
FindResourceA
FindResourceExA
lstrcatA
FreeLibrary
LoadLibraryExA
CreateThread
WaitForSingleObject
CreateMutexA
OpenMutexA
GetEnvironmentVariableA
WriteFile
CreateFileA
CreateProcessA
GetProcAddress
LoadLibraryA
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
GetCPInfo
LoadResource
GetOEMCP
GetCurrentProcess
TerminateProcess
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsBadWritePtr
VirtualFree
HeapCreate
GetCommandLineA
GetCurrentThreadId
VirtualQuery
GetSystemInfo
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
RegQueryInfoKeyA
RegEnumValueA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
UuidCreate
RpcStringFreeA
UuidToStringA
SHGetSpecialFolderPathA
SHGetFileInfoA
PathFindExtensionA
SetTimer
KillTimer
CharNextA
InternetOpenA
InternetReadFile
InternetQueryDataAvailable
HttpQueryInfoA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE