特征
从文件自身的二进制镜像中读取数据
self_read: process: RECYCLER.exe_, pid: 2032, offset: 0x00000000, length: 0x0012a523
self_read: process: RECYCLER.exe_, pid: 2032, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 1560, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 2204, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 2460, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 2684, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 2936, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 2160, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 2732, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 1156, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 2548, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 1868, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 3228, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 3448, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 3676, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 3904, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 2060, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 3512, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 3852, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 2848, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 3680, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 3768, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 4088, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 4292, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 4508, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 4736, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 4964, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 3328, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 4492, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 5052, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 4556, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 4008, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 5100, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 5180, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 5404, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 5632, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 5852, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 6080, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 4912, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 5804, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 5540, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 5620, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 6084, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 5552, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 6380, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 6620, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 6848, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 7076, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 6436, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 6804, offset: 0x0001a000, length: 0x00110523
self_read: process: 5848E2.EXE, pid: 7064, offset: 0x0001a000, length: 0x00110523
二进制文件可能包含加密或压缩数据
section: name: .text, entropy: 6.97, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00006000, virtual_size: 0x000051ec
section: name: .data, entropy: 6.82, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x0000d000, virtual_size: 0x0000d000
通过进程尝试长时间延迟分析任务
Process: explorer.exe tried to sleep 3000 seconds, actually delayed analysis time by 0 seconds
生成一个自己的复制文件
copy: C:\Windows\System32\911B41\5848E2.EXE
异常的二进制特征
anomaly: Timestamp on binary predates the release date of the OS version it requires by at least a year
anomaly: Found duplicated section names
文件已被至少十个VirusTotal上的反病毒引擎检测为病毒
Bkav: W32.FlyStudioTn.Heur
MicroWorld-eScan: Win32.Worm.Autorun.VE
CAT-QuickHeal: Backdoor.FlyAgent.F
McAfee: W32/Autorun.worm.bx
K7GW: Backdoor ( 04c544dc1 )
K7AntiVirus: Riskware ( 2c53ce810 )
F-Prot: <W32/Nuj.A.gen!Eldorado
Symantec: Packed.Generic.244
Norman: FlyAgent.CX
TotalDefense: Win32/Nuj.B!generic
TrendMicro-HouseCall: WORM_AUTORUN.SMW
Avast: Win32:EvilEPL [Cryp]
ClamAV: Worm.FlyStudio-22
Kaspersky: Trojan-Downloader.Win32.FlyStudio.il
BitDefender: Win32.Worm.Autorun.VE
Agnitum: Backdoor.FlyAgent!DKj8hwwixD4
SUPERAntiSpyware: Trojan.Agent/Gen-XPFraud
Ad-Aware: Win32.Worm.Autorun.VE
Sophos: Mal/EncPk-NB
F-Secure: Trojan-Dropper:W32/Peed.gen!A
DrWeb: Trojan.Siggen3.62001
VIPRE: Trojan.Win32.Autorun.dm (v)
AntiVir: TR/Dropper.Gen
TrendMicro: WORM_AUTORUN.SMW
McAfee-GW-Edition: W32/Autorun.worm.bx
Emsisoft: Win32.Worm.Autorun.VE (B)
Jiangmin: TrojanDownloader.FlyStudio.kb
Antiy-AVL: Trojan/Win32.FlyStudio
Kingsoft: Win32.Troj.EncodeFk.ak.(kcloud)
Microsoft: Backdoor:Win32/FlyAgent.F
AhnLab-V3: Win32/Flystudio.worm.Gen
GData: Win32.Worm.Autorun.VE
Commtouch: W32/Nuj.A.gen!Eldorado
Panda: Trj/Genetic.gen
ESET-NOD32: Win32/Packed.FlyStudio.O.Gen
Rising: PE:Trojan.Win32.Generic.12CD8397!315458455
Ikarus: Virus.Win32.Sality
Fortinet: W32/PckdFlyStudio.gen
AVG: Win32/Heur
行为分析
互斥量(Mutexes)
无信息
执行的命令
- explorer C:\Users\test\AppData\Local\Temp\RECYCLER_
- C:\Windows\system32\911B41\5848E2.EXE
- explorer C:\Windows\SysWOW64\911B41\5848E2
创建的服务
无信息
启动的服务
无信息
进程
RECYCLER.exe_ PID: 2032, 上一级进程 PID: 300
explorer.exe PID: 2044, 上一级进程 PID: 2032
5848E2.EXE PID: 1560, 上一级进程 PID: 2032
explorer.exe PID: 2128, 上一级进程 PID: 1560
5848E2.EXE PID: 2204, 上一级进程 PID: 1560
explorer.exe PID: 2352, 上一级进程 PID: 2204
5848E2.EXE PID: 2460, 上一级进程 PID: 2204
explorer.exe PID: 2592, 上一级进程 PID: 2460
5848E2.EXE PID: 2684, 上一级进程 PID: 2460
explorer.exe PID: 2812, 上一级进程 PID: 2684
5848E2.EXE PID: 2936, 上一级进程 PID: 2684
explorer.exe PID: 2080, 上一级进程 PID: 2936
5848E2.EXE PID: 2160, 上一级进程 PID: 2936
explorer.exe PID: 2456, 上一级进程 PID: 2160
5848E2.EXE PID: 2732, 上一级进程 PID: 2160
explorer.exe PID: 2908, 上一级进程 PID: 2732
5848E2.EXE PID: 1156, 上一级进程 PID: 2732
explorer.exe PID: 2876, 上一级进程 PID: 1156
5848E2.EXE PID: 2548, 上一级进程 PID: 1156
explorer.exe PID: 2728, 上一级进程 PID: 2548
5848E2.EXE PID: 1868, 上一级进程 PID: 2548
explorer.exe PID: 3152, 上一级进程 PID: 1868
5848E2.EXE PID: 3228, 上一级进程 PID: 1868
explorer.exe PID: 3372, 上一级进程 PID: 3228
5848E2.EXE PID: 3448, 上一级进程 PID: 3228
explorer.exe PID: 3604, 上一级进程 PID: 3448
5848E2.EXE PID: 3676, 上一级进程 PID: 3448
explorer.exe PID: 3832, 上一级进程 PID: 3676
5848E2.EXE PID: 3904, 上一级进程 PID: 3676
explorer.exe PID: 4056, 上一级进程 PID: 3904
5848E2.EXE PID: 2060, 上一级进程 PID: 3904
explorer.exe PID: 1668, 上一级进程 PID: 2060
5848E2.EXE PID: 3512, 上一级进程 PID: 2060
explorer.exe PID: 3644, 上一级进程 PID: 3512
5848E2.EXE PID: 3852, 上一级进程 PID: 3512
explorer.exe PID: 3332, 上一级进程 PID: 3852
5848E2.EXE PID: 2848, 上一级进程 PID: 3852
explorer.exe PID: 3752, 上一级进程 PID: 2848
5848E2.EXE PID: 3680, 上一级进程 PID: 2848
explorer.exe PID: 2100, 上一级进程 PID: 3680
5848E2.EXE PID: 3768, 上一级进程 PID: 3680
explorer.exe PID: 3908, 上一级进程 PID: 3768
5848E2.EXE PID: 4088, 上一级进程 PID: 3768
explorer.exe PID: 4212, 上一级进程 PID: 4088
5848E2.EXE PID: 4292, 上一级进程 PID: 4088
explorer.exe PID: 4436, 上一级进程 PID: 4292
5848E2.EXE PID: 4508, 上一级进程 PID: 4292
explorer.exe PID: 4664, 上一级进程 PID: 4508
5848E2.EXE PID: 4736, 上一级进程 PID: 4508
explorer.exe PID: 4892, 上一级进程 PID: 4736
5848E2.EXE PID: 4964, 上一级进程 PID: 4736
explorer.exe PID: 4112, 上一级进程 PID: 4964
5848E2.EXE PID: 3328, 上一级进程 PID: 4964
explorer.exe PID: 4428, 上一级进程 PID: 3328
5848E2.EXE PID: 4492, 上一级进程 PID: 3328
explorer.exe PID: 4168, 上一级进程 PID: 4492
5848E2.EXE PID: 5052, 上一级进程 PID: 4492
explorer.exe PID: 3656, 上一级进程 PID: 5052
5848E2.EXE PID: 4556, 上一级进程 PID: 5052
explorer.exe PID: 3404, 上一级进程 PID: 4556
5848E2.EXE PID: 4008, 上一级进程 PID: 4556
explorer.exe PID: 4944, 上一级进程 PID: 4008
5848E2.EXE PID: 5100, 上一级进程 PID: 4008
explorer.exe PID: 4724, 上一级进程 PID: 5100
5848E2.EXE PID: 5180, 上一级进程 PID: 5100
explorer.exe PID: 5328, 上一级进程 PID: 5180
5848E2.EXE PID: 5404, 上一级进程 PID: 5180
explorer.exe PID: 5556, 上一级进程 PID: 5404
5848E2.EXE PID: 5632, 上一级进程 PID: 5404
explorer.exe PID: 5780, 上一级进程 PID: 5632
5848E2.EXE PID: 5852, 上一级进程 PID: 5632
explorer.exe PID: 6008, 上一级进程 PID: 5852
5848E2.EXE PID: 6080, 上一级进程 PID: 5852
explorer.exe PID: 5156, 上一级进程 PID: 6080
5848E2.EXE PID: 4912, 上一级进程 PID: 6080
explorer.exe PID: 4960, 上一级进程 PID: 4912
5848E2.EXE PID: 5804, 上一级进程 PID: 4912
explorer.exe PID: 6060, 上一级进程 PID: 5804
5848E2.EXE PID: 5540, 上一级进程 PID: 5804
explorer.exe PID: 4512, 上一级进程 PID: 5540
5848E2.EXE PID: 5620, 上一级进程 PID: 5540
explorer.exe PID: 5752, 上一级进程 PID: 5620
5848E2.EXE PID: 6084, 上一级进程 PID: 5620
explorer.exe PID: 3728, 上一级进程 PID: 6084
5848E2.EXE PID: 5552, 上一级进程 PID: 6084
explorer.exe PID: 6280, 上一级进程 PID: 5552
5848E2.EXE PID: 6380, 上一级进程 PID: 5552
explorer.exe PID: 6540, 上一级进程 PID: 6380
5848E2.EXE PID: 6620, 上一级进程 PID: 6380
explorer.exe PID: 6768, 上一级进程 PID: 6620
5848E2.EXE PID: 6848, 上一级进程 PID: 6620
explorer.exe PID: 6996, 上一级进程 PID: 6848
5848E2.EXE PID: 7076, 上一级进程 PID: 6848
explorer.exe PID: 6188, 上一级进程 PID: 7076
5848E2.EXE PID: 6436, 上一级进程 PID: 7076
explorer.exe PID: 6600, 上一级进程 PID: 6436
5848E2.EXE PID: 6804, 上一级进程 PID: 6436
explorer.exe PID: 6524, 上一级进程 PID: 6804
5848E2.EXE PID: 7064, 上一级进程 PID: 6804
explorer.exe PID: 6664, 上一级进程 PID: 7064
访问的文件
- C:\Users\test\AppData\Local\Temp\RECYCLER.exe_
- C:\Users\test\AppData\Local\Temp\E_N4
- C:\Users\test\AppData\Local\Temp\E_N4\krnln.fnr
- C:\Users\test\AppData\Local\Temp\E_N4\HtmlView.fne
- C:\Users\test\AppData\Local\Temp\E_N4\internet.fne
- C:\Users\test\AppData\Local\Temp\E_N4\eAPI.fne
- C:\Users\test\AppData\Local\Temp\E_N4\dp1.fne
- C:\Users\test\AppData\Local\Temp\WINMM.dll
- C:\Windows\System32\winmm.dll
- C:\Users\test\AppData\Local\Temp\RECYCLER.exe_.Local\
- C:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af
- C:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
- C:\Users\test\AppData\Local\Temp\WINSPOOL.DRV
- C:\Windows\System32\winspool.drv
- C:\Users\test\AppData\Local\Temp\OLEPRO32.DLL
- C:\Windows\System32\olepro32.dll
- C:\Windows\Globalization\Sorting\sortdefault.nls
- C:\Users\test\AppData\Local\Temp\E_N4\HtmlView.fnr
- C:\Users\test\AppData\Local\Temp\oledlg.dll
- C:\Windows\System32\oledlg.dll
- C:\Users\test\AppData\Local\Temp\E_N4\eAPI.fnr
- C:\Users\test\AppData\Local\Temp\iphlpapi.dll
- C:\Windows\System32\IPHLPAPI.DLL
- C:\Users\test\AppData\Local\Temp\WINNSI.DLL
- C:\Windows\System32\winnsi.dll
- C:\Users\test\AppData\Local\Temp\MPR.dll
- C:\Windows\System32\mpr.dll
- C:\Users\test\AppData\Local\Temp\VERSION.dll
- C:\Windows\System32\version.dll
- C:\
- C:\Users\test\AppData\Local\Temp\E_N4\dp1.fnr
- C:\Windows\System32\911B41\
- C:\Windows\System32\911B41\5848E2.EXE
- C:\Windows\SysWOW64\explorer.exe.123.Manifest
- \Device\KsecDD
- C:\Windows\SysWOW64\shell32.dll
- C:\Users
- \??\MountPointManager
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000036.db
- C:\Users\desktop.ini
- C:\Users\test
- C:\Users\test\AppData
- C:\Users\test\AppData\Local
- C:\Users\test\AppData\Local\Temp
- C:\Users\test\AppData\Local\Temp\RECYCLER_
- C:\Users\test\Documents
- C:\Windows\SysWOW64\911B41\5848E2.EXE
- C:\Windows\SysWOW64\911B41\WINMM.dll
- C:\Windows\SysWOW64\911B41\5848E2.EXE.Local\
- C:\Windows\SysWOW64\911B41\WINSPOOL.DRV
- C:\Windows\SysWOW64\911B41\OLEPRO32.DLL
- C:\Windows\SysWOW64\911B41
- C:\Windows\SysWOW64\911B41\oledlg.dll
- C:\Windows\SysWOW64\911B41\iphlpapi.dll
- C:\Windows\SysWOW64\911B41\WINNSI.DLL
- C:\Windows\SysWOW64\911B41\MPR.dll
- C:\Windows\SysWOW64\911B41\VERSION.dll
- C:\Windows
- C:\Windows\SysWOW64
- C:\Windows\SysWOW64\911B41\5848E2
读取的文件
- C:\Users\test\AppData\Local\Temp\RECYCLER.exe_
- C:\Users\test\AppData\Local\Temp\E_N4\krnln.fnr
- C:\Windows\System32\winmm.dll
- C:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
- C:\Windows\System32\winspool.drv
- C:\Windows\System32\olepro32.dll
- C:\Windows\Globalization\Sorting\sortdefault.nls
- C:\Users\test\AppData\Local\Temp\E_N4\HtmlView.fne
- C:\Windows\System32\oledlg.dll
- C:\Users\test\AppData\Local\Temp\E_N4\eAPI.fne
- C:\Windows\System32\IPHLPAPI.DLL
- C:\Windows\System32\winnsi.dll
- C:\Windows\System32\mpr.dll
- C:\Windows\System32\version.dll
- C:\Users\test\AppData\Local\Temp\E_N4\dp1.fne
- C:\Windows\SysWOW64\explorer.exe.123.Manifest
- \Device\KsecDD
- C:\Windows\SysWOW64\shell32.dll
- C:\
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
- C:\Users\test\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000036.db
- C:\Users\desktop.ini
- C:\Users
- C:\Users\test
- C:\Users\test\AppData
- C:\Users\test\AppData\Local
- C:\Users\test\AppData\Local\Temp
- C:\Windows\SysWOW64\911B41\5848E2.EXE
- C:\Windows
- C:\Windows\SysWOW64
- C:\Windows\SysWOW64\911B41
修改的文件
- C:\Users\test\AppData\Local\Temp\E_N4\krnln.fnr
- C:\Users\test\AppData\Local\Temp\E_N4\HtmlView.fne
- C:\Users\test\AppData\Local\Temp\E_N4\internet.fne
- C:\Users\test\AppData\Local\Temp\E_N4\eAPI.fne
- C:\Users\test\AppData\Local\Temp\E_N4\dp1.fne
- C:\Windows\System32\911B41\5848E2.EXE
删除的文件
无信息
修改的注册表键
无信息
删除的注册表键
- HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LowRegistry\AddToFavoritesInitialSelection
- HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LowRegistry\AddToFeedsInitialSelection
API解析
- kernel32.dll.IsProcessorFeaturePresent
- krnln.fnr.GetNewSock
- cryptbase.dll.SystemFunction036
- kernel32.dll.SortGetHandle
- kernel32.dll.SortCloseHandle
- krnln.fnr.GetNewInf
- htmlview.fne.GetNewInf
- urlmon.dll.#414
- shell32.dll.SHGetSpecialFolderPathA
- eapi.fne.GetNewInf
- kernel32.dll.GetDiskFreeSpaceExA
- dp1.fne.GetNewInf
- oleaut32.dll.#500
- ole32.dll.CreateBindCtx
- ole32.dll.CoTaskMemAlloc
- ole32.dll.CoGetApartmentType
- ole32.dll.CoRegisterInitializeSpy
- ole32.dll.CoTaskMemFree
- comctl32.dll.#236
- oleaut32.dll.#6
- ole32.dll.CoGetMalloc
- comctl32.dll.#320
- ole32.dll.StringFromGUID2
- comctl32.dll.#324
- comctl32.dll.#323
- comctl32.dll.#328
- comctl32.dll.#334
- setupapi.dll.CM_Get_Device_Interface_List_Size_ExW
- advapi32.dll.RegEnumKeyW
- oleaut32.dll.#2
- setupapi.dll.CM_Get_Device_Interface_List_ExW
- ole32.dll.CoCreateInstance
- comctl32.dll.#332
- advapi32.dll.InitializeSecurityDescriptor
- advapi32.dll.SetEntriesInAclW
- comctl32.dll.#386
- ntmarta.dll.GetMartaExtensionInterface
- advapi32.dll.SetSecurityDescriptorDacl
- advapi32.dll.IsTextUnicode
- comctl32.dll.#338
- comctl32.dll.#339
- advapi32.dll.OpenThreadToken
- shell32.dll.#102
- ole32.dll.CoInitializeEx
- ole32.dll.CoUninitialize
- ole32.dll.CoRevokeInitializeSpy
- comctl32.dll.#388
- ole32.dll.NdrOleInitializeExtension
- ole32.dll.CoGetClassObject
- ole32.dll.CoGetMarshalSizeMax
- ole32.dll.CoMarshalInterface
- ole32.dll.CoUnmarshalInterface
- ole32.dll.StringFromIID
- ole32.dll.CoGetPSClsid
- ole32.dll.CoReleaseMarshalData
- ole32.dll.DcomChannelSetHResult
- ole32.dll.CoAllowSetForegroundWindow
- advapi32.dll.UnregisterTraceGuids
- cryptsp.dll.CryptReleaseContext
- comctl32.dll.#321
- wininet.dll.InternetSetOptionW