DllCanUnloadNow
DllGetClassObject
s
Static task
static1
Behavioral task
behavioral1
Sample
cd9713ed9b7f0acaba8a23cc30e5a2c8849c0eafa8144c6eae5091d98c83785a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd9713ed9b7f0acaba8a23cc30e5a2c8849c0eafa8144c6eae5091d98c83785a.dll
Resource
win10v2004-20221111-en
Target
cd9713ed9b7f0acaba8a23cc30e5a2c8849c0eafa8144c6eae5091d98c83785a
Size
47KB
MD5
96ec863dfea3b14478771323baab438e
SHA1
2d8c54fbaa44d9c757b4493dbcbe83014c5e2c72
SHA256
cd9713ed9b7f0acaba8a23cc30e5a2c8849c0eafa8144c6eae5091d98c83785a
SHA512
54ad9edabeed5cf9e544d2cfe3f81eca3e8c95214ef7f358019df3877f996ed3938eedbd7cc625a0e36edc4ad10fa3c8b0ce18f78dff356c460d331ce638dc26
SSDEEP
768:zCLuWcdkdI2ZID0kPlXi6R1iiLDYJQ0/RSxwAekxTyF5ybxu4BGRxFxlY:zCLsDftRUifYJQOOjhy/MOxb2
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
_onexit
__dllonexit
??1type_info@@UAE@XZ
_XcptFilter
atoi
_initterm
malloc
strncpy
strrchr
rand
srand
strtok
wcstombs
strcpy
strlen
mbstowcs
_itow
??_U@YAPAXI@Z
memset
memmove
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
_itoa
_amsg_exit
_adjust_fdiv
_except_handler3
?terminate@@YAXXZ
free
memcmp
??_V@YAXPAX@Z
_local_unwind2
InternetCloseHandle
HttpOpenRequestA
InternetReadFile
HttpSendRequestA
InternetOpenUrlA
InternetOpenA
InternetSetOptionA
InternetQueryOptionA
HttpQueryInfoA
InternetConnectA
HttpAddRequestHeadersA
DnsRecordListFree
DnsQuery_A
inet_addr
UnhandledExceptionFilter
GetCurrentProcessId
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
InterlockedExchange
lstrcmpiW
SetUnhandledExceptionFilter
lstrlenW
GetVersion
InterlockedDecrement
GetProcAddress
GetModuleHandleA
OpenProcess
RaiseException
lstrlenA
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
WaitForSingleObject
CloseHandle
VirtualFreeEx
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetCurrentProcess
GetSystemTime
SystemTimeToFileTime
SetFileTime
WriteFile
CreateFileA
GetFileSize
VirtualAlloc
ReadFile
VirtualFree
lstrcpyA
lstrcatA
CreateThread
OpenMutexA
GetModuleFileNameA
WaitForMultipleObjects
GetExitCodeThread
SetFilePointer
CreateMutexA
ReleaseMutex
DisableThreadLibraryCalls
ExitProcess
LoadLibraryA
Sleep
GetSystemTimeAsFileTime
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
lstrcpyW
lstrcatW
LeaveCriticalSection
InterlockedIncrement
TerminateThread
GetLastError
GetVolumeInformationA
GetTickCount
GetLogicalDriveStringsA
GetDriveTypeA
DeleteFileA
GetCurrentThreadId
CreateDirectoryA
LocalFree
CreateProcessA
GetVersionExA
FreeLibrary
GetCurrentThread
CreateEventA
TerminateProcess
WideCharToMultiByte
HeapAlloc
GetProcessHeap
HeapFree
SetFileAttributesA
GetSystemMetrics
wsprintfA
PostMessageA
SetWindowsHookExA
CallNextHookEx
CharUpperA
StartServiceA
QueryServiceStatusEx
QueryServiceConfigA
CloseServiceHandle
RegQueryValueExA
ConvertSidToStringSidA
IsValidSid
LookupAccountNameA
GetUserNameA
SetThreadToken
GetLengthSid
SetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegOpenKeyExA
ChangeServiceConfigA
ControlService
OpenServiceA
OpenSCManagerA
LookupPrivilegeValueA
DuplicateTokenEx
RegFlushKey
SetSecurityInfo
SetEntriesInAclA
RegCreateKeyExA
GetTokenInformation
RegCloseKey
RegSetValueExA
AdjustTokenPrivileges
OpenProcessToken
SHGetFolderPathA
CoCreateGuid
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemFree
SysStringLen
SysAllocString
VariantClear
VariantInit
DllCanUnloadNow
DllGetClassObject
s
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ