DllCanUnloadNow
DllGetClassObject
s
Static task
static1
Behavioral task
behavioral1
Sample
e4ef8ed09a555c3724a496f2c6b2d6e82bd0fe2a67d981fa81c7e92bf6bef58d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e4ef8ed09a555c3724a496f2c6b2d6e82bd0fe2a67d981fa81c7e92bf6bef58d.dll
Resource
win10v2004-20221111-en
Target
e4ef8ed09a555c3724a496f2c6b2d6e82bd0fe2a67d981fa81c7e92bf6bef58d
Size
65KB
MD5
0f8739f82bb6396126e7efad7d68a1ce
SHA1
fd685887f7e8b9acc11fcd1d1b5ea18aae51c2c4
SHA256
e4ef8ed09a555c3724a496f2c6b2d6e82bd0fe2a67d981fa81c7e92bf6bef58d
SHA512
887fb09e90fadcfbfc1d15483afc75b07b7419467f5c28ae683f4f89e01dcd892131ed60fe6a81e1891a021fc0ffc6bab6547053fa31df3a1cf2e68477901d00
SSDEEP
1536:lSzQkDnQc+ZXzyAJISPle/G+X7IG4ZAP2:wkCQcUXzyOISde/hX7IG4+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
?terminate@@YAXXZ
_adjust_fdiv
_amsg_exit
_initterm
_XcptFilter
_onexit
__dllonexit
??1type_info@@UAE@XZ
strcpy
atoi
wcstombs
towlower
tolower
rand
srand
_itow
mbstowcs
strtok
memset
free
malloc
_itoa
strlen
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
??_U@YAPAXI@Z
memmove
memcpy
??_V@YAXPAX@Z
_except_handler3
FlushFileBuffers
CreateRemoteThread
VirtualFreeEx
LocalFree
CreateToolhelp32Snapshot
Process32FirstW
lstrcmpiW
Process32NextW
CreateFileW
GetCurrentProcess
GetFileSize
VirtualAlloc
ReadFile
VirtualFree
GetModuleFileNameW
CreateThread
lstrcpyW
CreateMutexW
GetLastError
WaitForSingleObject
WaitForMultipleObjects
GetExitCodeThread
lstrlenW
OpenMutexW
GetProcAddress
Sleep
lstrcatW
SetFilePointer
WriteProcessMemory
ReleaseMutex
GetModuleFileNameA
DisableThreadLibraryCalls
ExitProcess
LoadLibraryW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
InitializeCriticalSection
GetSystemTimeAsFileTime
FreeLibrary
LoadLibraryA
GetDriveTypeW
DeleteFileW
GetTickCount
CreateDirectoryW
GetSystemTime
SystemTimeToFileTime
SetFileTime
GetLogicalDriveStringsW
RaiseException
GetVolumeInformationA
GetCurrentThread
CreateProcessW
OpenMutexA
OpenEventA
Process32First
GetCurrentProcessId
Process32Next
CreateEventW
TerminateThread
TerminateProcess
HeapAlloc
GetProcessHeap
HeapFree
SetFileAttributesW
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
GetVersion
InterlockedExchange
InterlockedCompareExchange
RtlUnwind
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WriteFile
VirtualAllocEx
OpenProcess
GetModuleHandleA
GetVersionExA
CloseHandle
lstrcatA
lstrcpyA
lstrlenA
LocalAlloc
SetEndOfFile
GetWindowsDirectoryA
GetSystemMetrics
UnhookWindowsHookEx
PostMessageA
SetWindowsHookExA
CallNextHookEx
RegCreateKeyExW
LookupPrivilegeValueA
CloseServiceHandle
StartServiceA
QueryServiceStatusEx
QueryServiceConfigA
ControlService
OpenServiceA
OpenSCManagerA
ConvertSidToStringSidW
IsValidSid
SetThreadToken
GetLengthSid
SetTokenInformation
DuplicateTokenEx
GetTokenInformation
SetEntriesInAclA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ChangeServiceConfigA
OpenProcessToken
RegDeleteValueW
RegFlushKey
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
SetSecurityInfo
AdjustTokenPrivileges
DllCanUnloadNow
DllGetClassObject
s
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ