DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
efe4cea059ad6164cde22df0d7ba58598404911e95c4690618fdd8786b4229ec.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
efe4cea059ad6164cde22df0d7ba58598404911e95c4690618fdd8786b4229ec.dll
Resource
win10v2004-20220901-en
Target
efe4cea059ad6164cde22df0d7ba58598404911e95c4690618fdd8786b4229ec
Size
188KB
MD5
ba554487e57425f3c64c2ae8f8f3c210
SHA1
6292f903af78b8deaa9bdfa4f572245448f3e288
SHA256
efe4cea059ad6164cde22df0d7ba58598404911e95c4690618fdd8786b4229ec
SHA512
91b7847456bc90f3b9a434c9a5c71db380d3759ce355b92e6b61ab92c4cc6f2b2459b4dfc2fb7f6a5428037f9157dea4bb81efceadb48be7317121012bc7ec19
SSDEEP
3072:aRJHaqHOjQxHtI52Ldr/4TCpyxuK0foCBxlDtliAmaFDwsdQwNZZD:MdaaOjKE2BwTwrK0ftDtl1maFDwsdQwt
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
FlushInstructionCache
GetCurrentProcess
InitializeCriticalSection
DisableThreadLibraryCalls
FindFirstFileW
FindNextFileW
FindClose
FormatMessageW
LocalAlloc
WaitForMultipleObjects
LoadLibraryW
GetLastError
lstrlenA
lstrcmpW
GetLocaleInfoW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
lstrcpyW
GetModuleFileNameW
GetComputerNameW
lstrcpynW
GetModuleHandleW
GetProcAddress
lstrlenW
WaitForSingleObject
GetCurrentThreadId
CreateThread
Sleep
SetEvent
CloseHandle
CreateEventW
LocalFree
ResetEvent
StrCpyNW
StrStrW
StrChrW
CoUninitialize
CoInitialize
CoCreateInstance
SysFreeString
VariantClear
SafeArrayUnaccessData
SysAllocStringLen
SafeArrayAccessData
VariantInit
SafeArrayCreateVector
SysStringLen
LoadRegTypeLi
DispCallFunc
SysAllocString
SHGetFolderPathW
HttpSendRequestW
HttpOpenRequestW
InternetReadFile
InternetCloseHandle
InternetCrackUrlW
InternetOpenW
InternetConnectW
ord18
ord15
ord16
ord21
ord57
ord30
ord58
ord11
ord10
ord32
ord23
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
malloc
_adjust_fdiv
_initterm
??2@YAPAXI@Z
__CxxFrameHandler
time
strlen
_CxxThrowException
memcpy
_purecall
memcmp
memset
printf
strtol
strchr
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_except_handler3
?terminate@@YAXXZ
wsprintfA
wsprintfW
StrNCatW
StrToIntW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ