DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ec14fd905e2dd4c77d6c4a58fc57ae30571608ec2c4ffb2f9f474c8d17bd35f9.dll
Resource
win7-20220901-en
Target
ec14fd905e2dd4c77d6c4a58fc57ae30571608ec2c4ffb2f9f474c8d17bd35f9
Size
164KB
MD5
f729a244f877aa0da1d42f4eaf857595
SHA1
ed2a4fab05f07a6bc2ef2bb22a3b7045de7b1bfd
SHA256
ec14fd905e2dd4c77d6c4a58fc57ae30571608ec2c4ffb2f9f474c8d17bd35f9
SHA512
136240ac1d687ce3c1a0072cfdee8f71a795f4dc5a7224e4d867a0c17718f3af45c831b9747459418ef27c3f47d99e9733a8ed5d2290ceb9690a199156c0f61c
SSDEEP
1536:h5b3JGF+N6lCfF/PPWdM/GXvszJb9YkL8W1LXQ3QJlzmT6IhF+SnP9efI0J+ZGt/:zbZGELvR/AWRXQOYo6b1YixqIrl+4CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
GetCurrentThreadId
GetCurrentProcessId
GetPrivateProfileIntA
GetPrivateProfileStringA
GetSystemDirectoryA
WritePrivateProfileStringA
IsBadWritePtr
IsBadReadPtr
MoveFileA
DeleteFileA
TerminateThread
CloseHandle
GetLocalTime
SetFileAttributesA
CopyFileA
WriteFile
CreateFileA
GetVersion
GetWindowsDirectoryA
CreateDirectoryA
GetShortPathNameA
FindClose
FindFirstFileA
WaitForSingleObject
Process32Next
TerminateProcess
GetExitCodeProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
SystemTimeToFileTime
FileTimeToSystemTime
GetUserDefaultLangID
GetTempPathA
GetPrivateProfileSectionNamesA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
SetFilePointer
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
lstrlenA
MultiByteToWideChar
lstrlenW
InterlockedDecrement
EnterCriticalSection
DisableThreadLibraryCalls
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetFileAttributesA
GetCurrentDirectoryA
GetFullPathNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetCurrentProcess
GetOEMCP
GetACP
GetCPInfo
VirtualAlloc
ExitProcess
VirtualFree
HeapCreate
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetCommandLineA
GetDriveTypeA
FileTimeToLocalFileTime
ExitThread
TlsSetValue
CreateThread
RaiseException
GetSystemTime
RtlUnwind
HeapFree
HeapAlloc
HeapReAlloc
GetTimeZoneInformation
SetEnvironmentVariableA
GetWindowTextA
CharNextA
LoadCursorA
SetWindowsHookExA
MessageBoxA
UnhookWindowsHookEx
SetFocus
GetParent
SetWindowTextA
GetClassNameA
CallNextHookEx
GetFocus
SetForegroundWindow
wsprintfA
FindWindowExA
LoadStringA
RegEnumKeyExA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
CoTaskMemRealloc
CoCreateInstance
CoCreateGuid
CoTaskMemAlloc
CoTaskMemFree
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringLen
SysAllocStringLen
VarUI4FromStr
SysFreeString
VariantCopy
VariantChangeType
VariantClear
SysAllocString
InternetOpenA
InternetOpenUrlA
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
InternetSetCookieA
DeleteUrlCacheEntry
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ