DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ef00dbec8a9dab3940fd0f11ac31fcd6395086bcc454dc4d5a727569a121174b.dll
Resource
win7-20221111-en
Target
ef00dbec8a9dab3940fd0f11ac31fcd6395086bcc454dc4d5a727569a121174b
Size
240KB
MD5
1ffb21d024bb25682b78d20d2ca53594
SHA1
58652af6c08c2167b8e2c4e800e331ffb2348783
SHA256
ef00dbec8a9dab3940fd0f11ac31fcd6395086bcc454dc4d5a727569a121174b
SHA512
75d0d34b9a7a3a0f184bded622d5a0d89af347e232787f5f48fccd221a651ab2c679e65223399a0073563c9a064162d52fb8846e4dcf62e4b995abd5b153bdec
SSDEEP
6144:Ib+4A1+P7QmaKfhISbQPO0cWpd3Q9YvyoLl3qo:2FA1+PcmaK3bQPJbRPKWlao
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SizeofResource
LockResource
LoadResource
FindResourceExA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
RaiseException
GetModuleHandleA
IsDBCSLeadByte
lstrcpynA
GetBinaryTypeA
UnmapViewOfFile
QueryDosDeviceA
OpenFileMappingA
UnlockFile
GetFileAttributesA
WinExec
DeleteFileA
CopyFileA
SetFileAttributesA
GetSystemDirectoryA
GetWindowsDirectoryA
CloseHandle
CreateProcessW
GetShortPathNameA
GetDiskFreeSpaceExA
SetFilePointer
GetLogicalDriveStringsA
WaitForSingleObject
CreateProcessA
CreateEventA
GetLogicalDrives
FindResourceA
GetCurrentDirectoryA
Process32Next
Process32First
CreateToolhelp32Snapshot
Module32Next
Module32First
CreateRemoteThread
GetProcAddress
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileExA
FreeLibrary
LoadLibraryA
FindClose
FindNextFileA
lstrcmpA
FindFirstFileA
OpenMutexA
GetVolumeInformationA
SetFileTime
SystemTimeToFileTime
CreateFileA
GetSystemTime
CreateDirectoryA
SetSystemTime
DeviceIoControl
SetEndOfFile
ReadFile
FlushFileBuffers
SetStdHandle
lstrcpyA
lstrcatA
GetLastError
CreateFileMappingA
GetPrivateProfileSectionA
GetModuleFileNameA
GetVersionExA
lstrlenA
lstrcmpiA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetProcessHeap
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
MoveFileA
GetCurrentThreadId
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
CharNextA
GetTextCharsetInfo
RegDeleteKeyA
OpenProcessToken
RegSetKeySecurity
RegSetValueA
OpenServiceA
QueryServiceStatus
OpenSCManagerA
OpenServiceW
CloseServiceHandle
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
CreateProcessAsUserW
RegOpenKeyA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
SHGetFileInfoA
CoGetClassObject
StringFromGUID2
CoCreateInstance
CoTaskMemFree
StringFromCLSID
CoUninitialize
CoInitialize
SysFreeString
SysStringLen
LoadRegTypeLi
VariantInit
VarUI4FromStr
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
PathFindExtensionA
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ