DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ef17bc9ca3609e473b9677998a1f1d9eeebac5a440f3785216346046bde4a9ba.dll
Resource
win7-20220812-en
Target
ef17bc9ca3609e473b9677998a1f1d9eeebac5a440f3785216346046bde4a9ba
Size
201KB
MD5
f9071ac1c60ff6000f0b50f429449fcc
SHA1
75e8940bf7b07ea03c332e411d33fe0b0f450ec7
SHA256
ef17bc9ca3609e473b9677998a1f1d9eeebac5a440f3785216346046bde4a9ba
SHA512
ce3a21fb1e2ec22ea065bed7cb0e0a72268a6a7c70d9e8ae7592cb7f71ef562ccbadd8201489846dc3925df62b894d690b1310d12eba536c035aed16f4d35222
SSDEEP
3072:ZIZse52aSMqLmE82n5d/r0Ih0/IQXqdLNdZHpEXOhuf721hjdPQF1LQwV6AmKaHE:W6e5Eif2n5d0fANdZSrf+cLCAm/P2dz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryExW
ResetEvent
CreateEventW
SetEvent
Sleep
CreateThread
GetCurrentThreadId
WaitForSingleObject
MultiByteToWideChar
lstrlenA
lstrlenW
WaitForMultipleObjects
DisableThreadLibraryCalls
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
lstrcmpiA
VirtualProtect
FormatMessageW
LocalAlloc
LocalFree
GetLastError
lstrcpyA
lstrcmpW
GetLocaleInfoW
GetVersionExW
WideCharToMultiByte
lstrcpyW
GetModuleFileNameW
GetComputerNameW
lstrcpynW
FlushInstructionCache
LoadLibraryW
GetCurrentProcess
WriteProcessMemory
VirtualQuery
GetCurrentProcessId
CloseHandle
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
GetProcAddress
GetModuleHandleA
GetSystemInfo
EnterCriticalSection
StrStrIW
StrChrW
StrStrW
CoUninitialize
CoCreateInstance
CoInitialize
SysAllocString
SafeArrayUnaccessData
SysAllocStringLen
SafeArrayAccessData
DispCallFunc
LoadRegTypeLi
SysStringLen
VariantClear
SafeArrayCreateVector
VariantInit
SysFreeString
InternetSetCookieExW
ord58
ord32
ord57
ord18
ord10
ord16
ord21
ord23
ord30
ord15
ord11
ImageDirectoryEntryToData
??0_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
_except_handler3
__CxxFrameHandler
??2@YAPAXI@Z
time
strlen
_CxxThrowException
memcpy
_purecall
memcmp
memset
printf
strtol
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
strchr
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_adjust_fdiv
?terminate@@YAXXZ
_initterm
malloc
wsprintfW
wsprintfA
StrToIntW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ