DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
922addae4cba0be3fc3df6542613a7c2e3c8f645c02360e0d6168e31a0becd76.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
922addae4cba0be3fc3df6542613a7c2e3c8f645c02360e0d6168e31a0becd76.dll
Resource
win10v2004-20220901-en
Target
922addae4cba0be3fc3df6542613a7c2e3c8f645c02360e0d6168e31a0becd76
Size
19KB
MD5
76cc019de3d6585dcffed113d4504df8
SHA1
6c067ba93de7abc0f988cd1788d11f87a0748f44
SHA256
922addae4cba0be3fc3df6542613a7c2e3c8f645c02360e0d6168e31a0becd76
SHA512
d6010160374974994bbbbc041f164739610e9ae216c18662bf26f8d6d38ab0a50cad35b4b8b6e90f2d71f721e985a7505908ef508d64d3c52b09e332c863a2ed
SSDEEP
384:8TKir1i/8WaBn6igjVJGBoe4p2lQb5fx69HOZFCV4W6:OKig//CWJGBxXebn69ujbW6
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
UuidToStringA
htons
InternetCrackUrlA
SHDeleteKeyA
ObtainUserAgentString
IsWindowVisible
CoTaskMemFree
VariantClear
ord58
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
_purecall
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE