DllCanUnloadNowW
DllRegisterServerW
DllUnregisterServerW
SmartStart
Static task
static1
Behavioral task
behavioral1
Sample
976224f3c81186e4973f204f0b4d219881c6ceecabbad3fd53ff14ad870dc1a7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
976224f3c81186e4973f204f0b4d219881c6ceecabbad3fd53ff14ad870dc1a7.dll
Resource
win10v2004-20221111-en
Target
976224f3c81186e4973f204f0b4d219881c6ceecabbad3fd53ff14ad870dc1a7
Size
33KB
MD5
ffeed947dd8bcad099a237792b28dc8f
SHA1
1be2cbf0f90430de68d09e5bac1e71c4133a67f9
SHA256
976224f3c81186e4973f204f0b4d219881c6ceecabbad3fd53ff14ad870dc1a7
SHA512
ea7ccf1125728f40032f7ed4e02f43469df39a84c81493bd62f951fb6496909d96f03f068f702e65d5870d4e80c7f08287d8d71962c2ae7333120aed71fee393
SSDEEP
384:Cj7Gw2FHocZyOafms8fvzqNkJegWdped33QEuxY3jXkpzvlRp/cgMgH:CPGScZUObquRW6wEP3jXktvlRl
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
GetSystemDirectoryA
GetTempPathA
HeapAlloc
GetProcessHeap
SetEvent
DeleteFileA
WriteFile
CreateFileA
ReadFile
CreateEventA
ConnectNamedPipe
GetCurrentProcess
GetStartupInfoA
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
CreateNamedPipeA
CreateThread
WaitForSingleObject
TerminateThread
CloseHandle
DisconnectNamedPipe
HeapFree
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCPInfo
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
VirtualFree
VirtualAlloc
HeapReAlloc
RtlUnwind
TerminateProcess
GetStdHandle
wsprintfA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CreateProcessAsUserA
URLDownloadToFileA
InternetConnectA
HttpQueryInfoA
InternetReadFile
InternetOpenA
HttpSendRequestA
HttpOpenRequestA
DllCanUnloadNowW
DllRegisterServerW
DllUnregisterServerW
SmartStart
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ