??0CLPTemplardll@@QAE@XZ
??4CLPTemplardll@@QAEAAV0@ABV0@@Z
?fnLPTemplardll@@YAHXZ
?nLPTemplardll@@3HA
Static task
static1
Behavioral task
behavioral1
Sample
0c0a6f866cb2497a5cde4fd8f3506f062e6629101758922828b17d1e619aa09d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0c0a6f866cb2497a5cde4fd8f3506f062e6629101758922828b17d1e619aa09d.dll
Resource
win10v2004-20220812-en
Target
0c0a6f866cb2497a5cde4fd8f3506f062e6629101758922828b17d1e619aa09d
Size
376KB
MD5
24779793f4b9d451542746c3b8e006f6
SHA1
f6570aa568a5433e37ba772446f2ae9a6aeb2f8a
SHA256
0c0a6f866cb2497a5cde4fd8f3506f062e6629101758922828b17d1e619aa09d
SHA512
ddc57ea1650a5065b9862ddcc76377c10ea522d7c32938981615b233b4a7d946fe810da753586d717d0009d9b03c5fd8e343486467542a381f432421ae826acd
SSDEEP
6144:c7hvGQG0Pw8kEWrzmumh6aD9tZI7Vme6OXqL+QNH:VQBY8kEWrzmJ0aRtZI7Vme6yqLNR
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Process32First
Process32Next
CreateThread
TerminateThread
GetTickCount
GetLocalTime
Sleep
RaiseException
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
GetFileAttributesA
GetModuleFileNameA
GetVersionExA
lstrcpyA
GetSystemInfo
GlobalMemoryStatusEx
GetCurrentProcessId
Module32First
OutputDebugStringA
CreateMutexA
ExpandEnvironmentStringsA
HeapAlloc
GetProcessHeap
HeapFree
DeviceIoControl
OpenFileMappingA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
ReleaseMutex
LeaveCriticalSection
DeleteFileA
CreateToolhelp32Snapshot
SetEndOfFile
ReadFile
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
LoadLibraryW
InterlockedExchange
GetStringTypeW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetSystemDirectoryA
GetWindowsDirectoryA
WriteFile
CreateFileA
FreeLibrary
LoadLibraryA
MultiByteToWideChar
lstrlenA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetModuleHandleA
GetProcAddress
WriteProcessMemory
VirtualAllocEx
lstrlenW
TerminateProcess
DuplicateHandle
OpenProcess
CloseHandle
GetCurrentProcess
SetLastError
GetStartupInfoW
GetFileType
SetHandleCount
RtlUnwind
GetLocaleInfoW
IsProcessorFeaturePresent
GetModuleFileNameW
GetStdHandle
LCMapStringW
HeapCreate
ExitProcess
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCommandLineA
GetCurrentThreadId
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InitializeCriticalSectionAndSpinCount
HeapSize
HeapReAlloc
HeapDestroy
LocalFree
FormatMessageA
GetLastError
CreateFileW
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfW
GetTokenInformation
RegQueryValueExA
RegCloseKey
SetSecurityDescriptorDacl
GetLengthSid
InitializeSecurityDescriptor
LookupAccountSidA
FreeSid
AddAccessAllowedAce
InitializeAcl
AllocateAndInitializeSid
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
SetSecurityInfo
SetEntriesInAclA
OpenProcessToken
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
CoCreateInstance
CoInitializeEx
CoUninitialize
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetCrackUrlA
InternetCloseHandle
InternetOpenA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
WSACleanup
gethostname
gethostbyname
WSAAddressToStringA
inet_addr
inet_ntoa
WSAStartup
GetBestInterface
GetIpAddrTable
GetAdaptersInfo
??0CLPTemplardll@@QAE@XZ
??4CLPTemplardll@@QAEAAV0@ABV0@@Z
?fnLPTemplardll@@YAHXZ
?nLPTemplardll@@3HA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ