DllGetClassObject
DllRegisterServer
EntryFunct1
EntryPoint1
PluginInit
e2imsws3r2gex1q915yr2b0wxckqgu1
mdb72z3kikzpe6nxbpx742uxlk1dsd
Static task
static1
Behavioral task
behavioral1
Sample
2d1655895c0dde4bc010c51b9b878c46.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2d1655895c0dde4bc010c51b9b878c46.dll
Resource
win10v2004-en-20220113
Target
2d1655895c0dde4bc010c51b9b878c46.dll
Size
570KB
MD5
2d1655895c0dde4bc010c51b9b878c46
SHA1
fb73914210b56c020a816325b3a5adb185e8f3ee
SHA256
0f5fbad82dae02e2a48775762f8ff0eb067eb4f81ce637607ac893d4e0c613b3
SHA512
08947de9e604fde5ef451302ba0591999aa864f96577986cdeebe2f9325e2f936940deb413bf872c94e9007c9997fd036f25a30208f763cfd163860b624aeed1
SSDEEP
12288:pcg3b2DHab9yoq5CXzSTA3mTsD7APAFIIm2mR+:pn2DHabnq9lTsD7KAFIIm2m4
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
ExitThread
GetSystemTime
VirtualAlloc
VirtualProtect
lstrcmpA
GetFileSize
WriteFile
GetTempPathA
CreateMutexA
GetTickCount
Sleep
GlobalAlloc
GetDateFormatA
GetTimeFormatA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetProcAddress
LoadLibraryA
lstrcatA
lstrcpyA
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
ExitProcess
CloseHandle
DeleteFileA
CreateFileA
Beep
VirtualFree
GetCommandLineA
GetKeyboardLayout
ActivateKeyboardLayout
MessageBoxA
RegisterClassA
SetTextColor
CreateFontIndirectA
DeleteObject
GetTextExtentPoint32A
SetBkMode
SetBkColor
GetSaveFileNameA
GetOpenFileNameA
FindTextA
InternetCanonicalizeUrlA
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetReadFile
InternetQueryOptionA
InternetSetOptionA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
HttpQueryInfoA
DllGetClassObject
DllRegisterServer
EntryFunct1
EntryPoint1
PluginInit
e2imsws3r2gex1q915yr2b0wxckqgu1
mdb72z3kikzpe6nxbpx742uxlk1dsd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ