DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ae4535eb49407e09b5933268c278a14b38040166f420bcc0a894926379e75be0.dll
Resource
win7-20221111-en
Target
ae4535eb49407e09b5933268c278a14b38040166f420bcc0a894926379e75be0
Size
201KB
MD5
dc539c074e67f71b51bf890d4e9b0b13
SHA1
a150d4d89ba49239a9a773f12e8a170c27b3145d
SHA256
ae4535eb49407e09b5933268c278a14b38040166f420bcc0a894926379e75be0
SHA512
fe9b7697b574f005e935be44c528b29ff9ee6d875759c14fcac7d6523e78bc1b9a43f507562df64785b2c26bb031d61aff5680555c7e402f9cb566624d7f3600
SSDEEP
3072:ZIZse52aSMqLmE82n5d/r0Ih0/IQXqdLNdZHpEXOhuf721hjdPQF1LQwV6AmKaHA:W6e5Eif2n5d0fANdZSrf+cLCAm/P2dz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryExW
ResetEvent
CreateEventW
SetEvent
Sleep
CreateThread
GetCurrentThreadId
WaitForSingleObject
MultiByteToWideChar
lstrlenA
lstrlenW
WaitForMultipleObjects
DisableThreadLibraryCalls
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
lstrcmpiA
VirtualProtect
FormatMessageW
LocalAlloc
LocalFree
GetLastError
lstrcpyA
lstrcmpW
GetLocaleInfoW
GetVersionExW
WideCharToMultiByte
lstrcpyW
GetModuleFileNameW
GetComputerNameW
lstrcpynW
FlushInstructionCache
LoadLibraryW
GetCurrentProcess
WriteProcessMemory
VirtualQuery
GetCurrentProcessId
CloseHandle
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
GetProcAddress
GetModuleHandleA
GetSystemInfo
EnterCriticalSection
StrStrIW
StrChrW
StrStrW
CoUninitialize
CoCreateInstance
CoInitialize
SysAllocString
SafeArrayUnaccessData
SysAllocStringLen
SafeArrayAccessData
DispCallFunc
LoadRegTypeLi
SysStringLen
VariantClear
SafeArrayCreateVector
VariantInit
SysFreeString
InternetSetCookieExW
ord58
ord32
ord57
ord18
ord10
ord16
ord21
ord23
ord30
ord15
ord11
ImageDirectoryEntryToData
??0_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
_except_handler3
__CxxFrameHandler
??2@YAPAXI@Z
time
strlen
_CxxThrowException
memcpy
_purecall
memcmp
memset
printf
strtol
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
strchr
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_adjust_fdiv
?terminate@@YAXXZ
_initterm
malloc
wsprintfW
wsprintfA
StrToIntW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ