CheckIEHistory
GetVerID
Static task
static1
Behavioral task
behavioral1
Sample
ea945b3816258a8b72555a0527fcc8d5741ba0d71ca053c22b41e6e0065fe597.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea945b3816258a8b72555a0527fcc8d5741ba0d71ca053c22b41e6e0065fe597.dll
Resource
win10v2004-20220812-en
Target
ea945b3816258a8b72555a0527fcc8d5741ba0d71ca053c22b41e6e0065fe597
Size
6KB
MD5
bd7761fb59f6c969670f68e927b9c71e
SHA1
32afd2e32e66c73f48188c4bfc7700b4ba9d6de5
SHA256
ea945b3816258a8b72555a0527fcc8d5741ba0d71ca053c22b41e6e0065fe597
SHA512
32c99eebd92414085474149525b156110a253ca2b91776c723f2dcddc61eb747699b31e3a86072e1bf1b63c03f28a787a34ab5dbfd9a3df7b2fb5ccc1c8f26e9
SSDEEP
96:AEn4444BQ4444x4444A4444GJ4444L4444O444454444X4444w444474444X444y:AEy59qpKsvq+WMdV064KKF2AdKF
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetProcessHeap
lstrlenA
GetCurrentProcess
GetLastError
HeapAlloc
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
HeapFree
GlobalAlloc
CloseHandle
lstrcpynA
wsprintfA
CharLowerBuffA
RegCloseKey
RegOpenKeyA
RegEnumValueA
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
InternetCrackUrlA
CheckIEHistory
GetVerID
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ