DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Register
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
e0489a627cfaf8d678613713da2ab46ff81e9d725ed9a96272954509814fc103.dll
Resource
win7-20221111-en
Target
e0489a627cfaf8d678613713da2ab46ff81e9d725ed9a96272954509814fc103
Size
274KB
MD5
5cb6f24563acee87ffe60f51302eed9a
SHA1
a3c40e470f712be789b87d3e8dbaaf3cd085632d
SHA256
e0489a627cfaf8d678613713da2ab46ff81e9d725ed9a96272954509814fc103
SHA512
503f919b2f725589f2d22f1ac4439b665c0ae60ef3668e8c41059969ed24df2ef8ab489c6608d8ea62e645c686dd94135023fb88a017dbdb97a2cf230ab7388e
SSDEEP
6144:eYsX+ZVu4W1a01nBa7JsvSFaLomcSoogu5QPoQTEqkY49jak3rRo:elg/FsvSFsHQjTR8jawrRo
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PathFindFileNameA
SHGetValueA
SHSetValueA
PathFindExtensionA
PathIsUNCA
SHDeleteValueA
PathFileExistsA
PathAppendA
PathStripToRootA
PathRemoveExtensionA
SHGetValueW
PathRemoveFileSpecA
PathRemoveBackslashA
PathRemoveBlanksA
SHDeleteKeyA
StrStrIA
CreateThread
Sleep
SetThreadPriority
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
OpenMutexA
EnterCriticalSection
ReadFile
GetFileSize
CreateFileA
GetShortPathNameA
GetLongPathNameA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetTickCount
FindClose
FindNextFileA
FindFirstFileA
CreateMutexA
lstrcmpA
lstrlenW
lstrcpynW
lstrlenA
lstrcpynA
MultiByteToWideChar
WaitForSingleObject
TerminateThread
WideCharToMultiByte
GetModuleFileNameW
LoadLibraryW
CreateToolhelp32Snapshot
GetModuleHandleW
OutputDebugStringA
GetFileAttributesW
GetLastError
LoadLibraryExA
SetLastError
GetModuleFileNameA
lstrcpyA
CopyFileA
ReadProcessMemory
FreeLibrary
DeleteFileA
VirtualQuery
lstrcmpiA
VirtualProtect
WriteProcessMemory
GetCurrentProcessId
Module32First
Module32Next
CloseHandle
GetModuleHandleA
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
GetProcAddress
GetVersion
GetTempPathA
InterlockedExchange
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
LocalFree
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
FindResourceA
LoadResource
lstrcatA
IsBadStringPtrA
GlobalLock
GlobalSize
HeapFree
HeapAlloc
GetProcessHeap
IsDebuggerPresent
GetACP
CreateProcessA
GetPrivateProfileStructA
WritePrivateProfileStructA
WriteFile
MoveFileExA
WritePrivateProfileStringA
GetPrivateProfileIntA
DeviceIoControl
WritePrivateProfileSectionA
GetCurrentThreadId
GetPrivateProfileStringA
IsBadReadPtr
IsBadStringPtrW
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SizeofResource
LockResource
RegisterWindowMessageA
FindWindowExA
MessageBoxA
SetWindowsHookExA
InvalidateRect
UnhookWindowsHookEx
ReleaseDC
DrawTextA
GetWindowTextA
FillRect
GetSysColor
GetDC
CallWindowProcA
GetFocus
CallNextHookEx
PostMessageA
GetKeyState
ShowWindow
IsWindowVisible
SetPropA
RemovePropA
IsWindowUnicode
GetWindowLongW
SetWindowLongW
GetComboBoxInfo
DrawFocusRect
GetSystemMetrics
LoadIconA
GetClassNameA
SendMessageA
SetWindowTextA
IsWindow
GetParent
EnumWindows
GetWindowThreadProcessId
SendMessageTimeoutA
EnumChildWindows
DialogBoxParamA
GetWindowLongA
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItemTextA
EndDialog
GetWindowTextLengthA
GetDlgItem
EnableWindow
DefWindowProcA
LoadStringA
OpenSCManagerA
CloseServiceHandle
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
ControlService
StartServiceA
QueryServiceStatus
OpenServiceA
DeleteService
GetLengthSid
InitializeAcl
AddAccessAllowedAce
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegCloseKey
CreateServiceA
SetSecurityDescriptorDacl
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
RegSetKeySecurity
FreeSid
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
OleRun
CoCreateInstance
RegisterDragDrop
RevokeDragDrop
CoCreateGuid
ReleaseStgMedium
OleInitialize
CoTaskMemFree
OleUninitialize
CoInitialize
CoUninitialize
StringFromCLSID
VariantClear
SysFreeString
SysAllocString
ImageDirectoryEntryToData
strstr
rewind
wcslen
strrchr
strchr
fread
ftell
malloc
tmpnam
_wcsicmp
_strnicmp
strncpy
_stricmp
_mbstok
??1type_info@@UAE@XZ
atol
_mbslen
_open
_read
_write
_close
_lseek
__dllonexit
_onexit
_initterm
_adjust_fdiv
fputs
fseek
time
srand
fwrite
_CxxThrowException
printf
_mbsnbcpy
_vsnprintf
atoi
_ismbcdigit
_mbclen
fopen
fgets
fclose
bsearch
_mbsrchr
free
_snprintf
realloc
_mbslwr
_mbsstr
_mbschr
_mbsnbicmp
_mbscmp
sprintf
_purecall
rand
_mbsicmp
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
_except_handler3
_tempnam
_strlwr
_wcsnicmp
_itoa
_ltoa
URLDownloadToFileA
IsValidURL
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
setsockopt
connect
send
WSAGetLastError
gethostbyname
socket
htons
WSAStartup
WSACleanup
inet_addr
closesocket
recv
GetTextAlign
SetTextAlign
SetBkColor
ExtTextOutA
CreatePen
LineTo
SetPixel
GetTextExtentPointA
SetTextColor
DeleteObject
GetStockObject
SelectObject
MoveToEx
CreateSolidBrush
SetBkMode
SHGetFileInfoA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetSpecialFolderPathA
DeleteUrlCacheEntry
InternetCrackUrlA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Register
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ