DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
e5aa2d88b7060cc7dc310da721b54bab76a0b11909a9ea47ac20cd6e02004ee7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e5aa2d88b7060cc7dc310da721b54bab76a0b11909a9ea47ac20cd6e02004ee7.dll
Resource
win10v2004-20221111-en
Target
e5aa2d88b7060cc7dc310da721b54bab76a0b11909a9ea47ac20cd6e02004ee7
Size
228KB
MD5
31b9e28a7513ca4865e64fee6ff00af0
SHA1
547c91f4c5cffe06a56518b0f9df3e81bf9482a0
SHA256
e5aa2d88b7060cc7dc310da721b54bab76a0b11909a9ea47ac20cd6e02004ee7
SHA512
1d04ece6f19f6fa3813467d291d01ccc2d40ed26b919bba1462dd6244f8124a35a50afafb4ef8d8c34c8840593301bf12b7b6424ffd5f1e7039b2b4df83963a3
SSDEEP
6144:IuVj91TRxTnIdoXAiIWnmzgALbwUp1AvlMK8cOWiyvH5YskWLP:IuVj91TRxTnIdoXAiIWnmMALbwUp1tKF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
GetCurrentThreadId
RaiseException
FlushInstructionCache
GetCurrentProcess
MulDiv
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
lstrcpyA
GetPrivateProfileStringA
lstrcatA
InterlockedExchange
lstrlenA
Sleep
InterlockedCompareExchange
IsDBCSLeadByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
LocalFree
GetCurrentProcessId
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
SizeofResource
InitializeCriticalSection
SetLastError
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
GetProcAddress
HeapAlloc
GetProcessHeap
HeapFree
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
GetSystemTimeAsFileTime
lstrcmpiA
LoadLibraryExA
FreeLibrary
GetLastError
MultiByteToWideChar
TerminateProcess
GetModuleFileNameA
WideCharToMultiByte
lstrlenW
FindResourceA
LoadResource
LockResource
LocalAlloc
GetLocalTime
GetDialogBaseUnits
SetWindowTextA
EnableWindow
GetDlgCtrlID
CheckDlgButton
MessageBoxA
CheckRadioButton
ExitWindowsEx
IsDlgButtonChecked
SendMessageA
GetDC
ReleaseDC
UnregisterClassA
GetParent
SetWindowLongA
CharNextA
DestroyWindow
CreateDialogParamA
IsDialogMessageA
WinHelpA
MoveWindow
ShowWindow
IsWindow
GetDlgItem
SendDlgItemMessageA
CreateFontIndirectA
SelectObject
GetTextMetricsA
GetTextExtentPointA
DeleteObject
GetDeviceCaps
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumKeyExA
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
RegisterTypeLi
LoadTypeLi
UnRegisterTypeLi
VarUI4FromStr
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocString
ord581
ord1209
ord1177
ord1175
ord1201
ord1120
ord1167
ord1098
ord1208
ord1206
ord1092
ord1037
ord1084
ord315
ord765
ord371
ord2372
ord3070
ord757
ord764
ord3683
ord3830
ord2248
ord1049
ord314
ord1917
ord762
ord265
ord266
ord1185
ord1187
ord1191
ord6754
ord566
ord3333
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__clean_type_info_names_internal
_crt_debugger_hook
fclose
fprintf
fopen
vsprintf
free
memset
malloc
__CxxFrameHandler3
_purecall
_resetstkoflw
memcpy_s
_mbsnbcpy_s
memcmp
strcpy_s
strcat_s
strlen
wcsncpy_s
_recalloc
calloc
_itoa
memcpy
_except_handler4_common
_unlock
_encode_pointer
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE