DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a2888e629b5a399229d95de394ec01706c1bcb82a848a295af6ec5f6e2623867.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2888e629b5a399229d95de394ec01706c1bcb82a848a295af6ec5f6e2623867.dll
Resource
win10v2004-20221111-en
Target
a2888e629b5a399229d95de394ec01706c1bcb82a848a295af6ec5f6e2623867
Size
312KB
MD5
7fc376ba2982accccadafe7b01972dd8
SHA1
e78e457428c24df022c797135ac5f8cb107d8ff4
SHA256
a2888e629b5a399229d95de394ec01706c1bcb82a848a295af6ec5f6e2623867
SHA512
40ed65e3eacc69dd0e98ec3175df49884192ae9d240eca5bb2fdb46adb01107f7936e7ead0b85eb4bda7443a0ff7d6a4ac8e331b2b741d20d25b812b0c5fe891
SSDEEP
3072:sLRvGKyg+Kvh3icwkzVASu/p96tr997KJg+uQaHVoYD8B7+6kJCdOm5bdJWlGI5p:gUKyPKvhyv7EZ97Xq+6KCdOwbulG
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Module32Next
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
CreateThread
GetLastError
SetLastError
TerminateThread
DisableThreadLibraryCalls
GetTickCount
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
CopyFileA
ReadFile
LocalFree
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
CreateProcessA
GetLocalTime
GetCurrentProcessId
SetFilePointer
lstrlenW
WriteFile
GetFileSize
CloseHandle
GetSystemDirectoryA
Sleep
LoadLibraryA
FreeLibrary
CreateFileA
GetVersionExA
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetVersion
GetEnvironmentVariableA
GetModuleFileNameA
OutputDebugStringA
DebugBreak
InterlockedDecrement
CreateDirectoryA
MultiByteToWideChar
WideCharToMultiByte
InterlockedIncrement
lstrlenA
DeleteFileA
EnterCriticalSection
CharNextA
wvsprintfA
LoadStringA
wsprintfA
GetSystemMetrics
CallNextHookEx
GetClassNameA
KillTimer
CharLowerA
UnhookWindowsHookEx
SetTimer
wsprintfW
GetParent
SendMessageTimeoutA
RegisterWindowMessageA
DestroyWindow
SendMessageA
SetWindowsHookExA
GetActiveWindow
ShowWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
SetActiveWindow
SetForegroundWindow
SetFocus
BringWindowToTop
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextA
RegEnumKeyExA
RegQueryInfoKeyA
SHGetSpecialFolderPathA
CoInitialize
CoCreateInstance
SysFreeString
SysAllocString
LoadRegTypeLi
SysStringLen
VariantClear
VariantChangeType
VariantCopy
SysAllocStringLen
ord31
ord30
ord58
ord32
ord57
ord15
ord16
ord21
ord23
??_7out_of_range@std@@6B@
??0logic_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@IIABV?$allocator@D@1@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??9std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??8std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIPBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
??0logic_error@std@@QAE@ABV01@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?_Xran@std@@YAXXZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??_D?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
?str@?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??0?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
URLDownloadToFileA
InternetAttemptConnect
InternetCloseHandle
InternetOpenA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
HttpQueryInfoA
InternetReadFile
InternetCrackUrlA
InternetOpenUrlA
InternetConnectA
Netbios
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
atoi
strlen
atol
_stricmp
time
strcmp
??2@YAPAXI@Z
_mbscmp
localtime
strstr
_except_handler3
_CxxThrowException
memcpy
_ismbcspace
memmove
_mbsstr
_mbschr
??0exception@@QAE@ABV0@@Z
_ismbcdigit
_mbsicmp
_mbsnbcpy
_mbsrchr
strcpy
memset
__CxxFrameHandler
strcat
_mbslwr
_itoa
sprintf
_purecall
memcmp
rand
srand
_local_unwind2
strncpy
free
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
malloc
_adjust_fdiv
wcslen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ