DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ef70d5cfec04f7d3567c6a1ad2783efca9031aa98e4552d783143f198fbf0101.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ef70d5cfec04f7d3567c6a1ad2783efca9031aa98e4552d783143f198fbf0101.dll
Resource
win10v2004-20221111-en
Target
ef70d5cfec04f7d3567c6a1ad2783efca9031aa98e4552d783143f198fbf0101
Size
378KB
MD5
c4c293e8f413bb2d6cce594d81e7e8d3
SHA1
7f6dbd6e86b9ee45e96940c03d265f840a8536f6
SHA256
ef70d5cfec04f7d3567c6a1ad2783efca9031aa98e4552d783143f198fbf0101
SHA512
befcee93310f22dabfe2db99988f675ab4a6d810cb8b0e71232698f0e509bd0436046463076dfe2c0b265dbd8fb42f8118f1455ade8c163ace1c19a5022aa791
SSDEEP
6144:M+ogKntpoeao8cJB9i0mkvrZkQEYuCn2/LJ60NCL3GmA6uGZpUiZe:MFgKtpoplR0mkjZ1ymPFpde
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
?GetZipItemW@@YGKPAUHZIP__@@_KPAUZIPENTRYW@@@Z
?UnzipItemMemory@@YGKPAUHZIP__@@_KPAXI@Z
?SetUnzipBaseDirW@@YGKPAUHZIP__@@PB_W@Z
?UnzipItemW@@YGKPAUHZIP__@@_KPB_W@Z
?OpenZipW@@YGPAUHZIP__@@PB_WPBD@Z
?FindZipItemW@@YGKPAUHZIP__@@PB_W_NPA_KPAUZIPENTRYW@@@Z
?CloseZip@@YGKPAUHZIP__@@@Z
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
lstrlenW
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetModuleFileNameW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
SetThreadLocale
GetThreadLocale
CreateDirectoryW
lstrcpynW
lstrcpyW
lstrcatW
GetTempPathW
LockResource
FindResourceExW
FindClose
GetLastError
FindFirstFileW
GetCurrentProcess
lstrlenA
CloseHandle
GetExitCodeProcess
WaitForSingleObject
GetVersionExW
GetCurrentProcessId
GetFileAttributesExW
DeleteFileW
ReadFile
GetFileSize
CreateFileW
GetLocaleInfoW
SetDllDirectoryW
GetDllDirectoryW
CopyFileW
MoveFileW
WideCharToMultiByte
SetStdHandle
SetFilePointer
GetStringTypeW
RaiseException
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleW
RtlUnwind
VirtualProtect
GetSystemInfo
VirtualAlloc
FindNextFileW
LCMapStringW
LoadLibraryW
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStartupInfoW
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
DecodePointer
EncodePointer
LocalFree
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
VirtualQuery
GetCurrentThreadId
GetCommandLineA
Sleep
ExitProcess
WriteFile
GetStdHandle
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetACP
GetCPInfo
IsProcessorFeaturePresent
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CharUpperBuffW
CharNextW
wsprintfW
MessageBoxW
GetActiveWindow
CharLowerBuffW
RegEnumKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
ShellExecuteExW
SHCreateDirectoryExW
SHFileOperationW
SHGetFolderPathW
ord680
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoGetObject
StringFromIID
CoCreateFreeThreadedMarshaler
CLSIDFromProgID
StringFromGUID2
LoadRegTypeLi
VariantCopy
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
VariantInit
SystemTimeToVariantTime
SysStringByteLen
SysAllocStringByteLen
VariantClear
VarBstrCmp
SysAllocStringLen
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
VarBstrCat
?tmPrintf@@YAXHKPBD0ZZ
?tmGetPrefixFormat@@YGHPAUHINSTANCE__@@QADPBD@Z
StrStrIW
PathAddExtensionW
StrNCatW
PathIsURLW
PathIsRelativeW
PathIsDirectoryW
PathRemoveFileSpecW
PathAppendW
StrCmpNIW
StrChrW
PathFileExistsW
StrRChrW
PathRemoveArgsW
PathGetArgsW
PathFindExtensionW
SHCreateStreamOnFileW
StrStrW
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE