DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c24cd13af56c9f80b70aca30c16356bff28a685330ab517e75bae7400f6a88b7.dll
Resource
win7-20220812-en
Target
c24cd13af56c9f80b70aca30c16356bff28a685330ab517e75bae7400f6a88b7
Size
29KB
MD5
81a25b1960bc821d1e774b24e2ed694c
SHA1
1a0070295705409a8e7b223363b664b472d278e2
SHA256
c24cd13af56c9f80b70aca30c16356bff28a685330ab517e75bae7400f6a88b7
SHA512
0df74a4fb2d96e222a3ba73c924251322a96f14d57aa519e58baa1174a13404b51517c9261fbaf40803f003442a2f5340bd648c328c5412675538e06c6db5ba0
SSDEEP
384:Thz2TqX3IxKFw7UHuvWzOTkKTwGMYUWVHQKc0APLLteNC4vA9gstXtUjea2zPOL5:TrX7wtwONMYUWJ60CxeNzAKstowd4J
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetEvent
CloseHandle
GetSystemDirectoryW
WaitForSingleObject
ExitThread
GetTickCount
lstrlenW
GetModuleHandleA
lstrcpyW
lstrcatW
GetProcessHeap
HeapFree
IsBadStringPtrA
lstrcmpA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
GetVersionExA
GetLongPathNameA
HeapAlloc
HeapReAlloc
lstrlenA
CompareStringW
Sleep
lstrcatA
GetSystemDirectoryA
SetFilePointer
CreateFileA
ReleaseMutex
SetEndOfFile
CreateEventA
CreateMutexW
CreateThread
ReadFile
WriteFile
WriteProcessMemory
GetCurrentProcess
VirtualProtect
lstrcmpiA
lstrcpyA
wsprintfW
CharLowerA
CharUpperW
wsprintfA
InitializeSecurityDescriptor
CryptReleaseContext
CryptDestroyKey
CryptDestroyHash
CryptEncrypt
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptAcquireContextA
CryptDecrypt
SysAllocString
SysFreeString
InternetConnectA
InternetCrackUrlA
InternetCrackUrlW
CoInternetCombineUrl
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ