ConvertToBMP
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetDownloadManager
GetHelperObject
IsUnicode
StaticCallJS
UnpackGzip
Static task
static1
Behavioral task
behavioral1
Sample
e06d7f4f790fa4a1b94556c78585f2f83d209f20552a262424a78710adb9f107.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e06d7f4f790fa4a1b94556c78585f2f83d209f20552a262424a78710adb9f107.dll
Resource
win10v2004-20220812-en
Target
e06d7f4f790fa4a1b94556c78585f2f83d209f20552a262424a78710adb9f107
Size
544KB
MD5
4f604ebfc959a6e0782273af1fb91b40
SHA1
e301e18a8a73a27077911e2f1b4c81695cb36519
SHA256
e06d7f4f790fa4a1b94556c78585f2f83d209f20552a262424a78710adb9f107
SHA512
893515b399cd1e2103c70457d3f3da97a5e9d2ec887effdc90228f3e9501435def97ab233a65d9bf7072899742747e15e68bb99c86a8441bba73fb759687dfd4
SSDEEP
12288:S4ciF6xLyNidzkj65XnJ1GTJX3nsEc8B+XLEqIeX6gAy/+:S4rFMkj65XnCTd3sVXMeBAG+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PathStripPathW
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
UrlIsW
UuidFromStringA
InternetCloseHandle
InternetConnectW
HttpSendRequestW
InternetSetStatusCallbackW
HttpAddRequestHeadersW
InternetCrackUrlW
InternetOpenW
HttpQueryInfoA
InternetReadFile
HttpOpenRequestA
ObtainUserAgentString
IsValidURL
InetIsOffline
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetLocaleInfoA
WaitForSingleObject
LoadLibraryW
TerminateThread
GetVersionExW
GetProcAddress
GetExitCodeThread
CreateThread
FindResourceExW
FindResourceW
LoadResource
InterlockedDecrement
GetCurrentProcess
SetEvent
InitializeCriticalSection
WideCharToMultiByte
SizeofResource
LeaveCriticalSection
lstrlenW
FlushInstructionCache
RaiseException
SetLastError
MoveFileW
EnterCriticalSection
LockResource
CreateEventW
DeleteCriticalSection
GetCurrentThreadId
ReleaseMutex
CloseHandle
DeleteFileW
SwitchToThread
lstrlenA
FreeLibrary
MultiByteToWideChar
GetVersion
GetModuleFileNameW
GetFileSize
ReadFile
CreateFileW
CreateMutexA
LoadLibraryExW
InterlockedIncrement
GetModuleHandleW
ExitProcess
DisableThreadLibraryCalls
lstrcmpiW
WriteFile
Sleep
SetThreadPriority
ReleaseSemaphore
CreateSemaphoreW
ResumeThread
IsBadReadPtr
GetStringTypeW
GetStringTypeA
LCMapStringA
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetModuleHandleA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
HeapCreate
GetModuleFileNameA
GetCPInfo
TlsFree
TlsSetValue
CreateFileA
SetStdHandle
LCMapStringW
IsValidCodePage
GetOEMCP
TlsAlloc
TlsGetValue
GetCommandLineA
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
GetLastError
VirtualQuery
HeapFree
GetProcessHeap
InterlockedCompareExchange
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
HeapDestroy
HeapReAlloc
HeapSize
GlobalAddAtomA
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
GetACP
UnregisterClassA
FindWindowW
CreateWindowExW
DispatchMessageW
DefWindowProcW
MessageBoxW
CharNextW
SetTimer
GetMessageW
PostMessageW
KillTimer
LoadCursorW
GetClassInfoExW
TranslateMessage
RegisterClassExW
GetWindowLongW
PeekMessageW
SetWindowLongW
SendMessageTimeoutW
IsWindow
CallWindowProcW
SendMessageW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
GetUserNameW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
DoEnvironmentSubstW
CoCreateInstance
CoInitialize
CoUninitialize
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
VariantChangeType
VariantInit
VariantCopy
VariantClear
LoadRegTypeLi
RegisterTypeLi
VarUI4FromStr
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SysFreeString
DnsQuery_W
ConvertToBMP
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetDownloadManager
GetHelperObject
IsUnicode
StaticCallJS
UnpackGzip
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE