NP_GetEntryPoints
NP_GetMIMEDescription
NP_Initialize
NP_Shutdown
Static task
static1
Behavioral task
behavioral1
Sample
12bc842bc567ad14d9a42b0724a38f43885381e35f305f9a6cca7859ad8361b2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
12bc842bc567ad14d9a42b0724a38f43885381e35f305f9a6cca7859ad8361b2.dll
Resource
win10v2004-20221111-en
Target
12bc842bc567ad14d9a42b0724a38f43885381e35f305f9a6cca7859ad8361b2
Size
76KB
MD5
297dc1c69d4427b6bf9738ee2ff81ceb
SHA1
424f1374c23b6f7726497201344f44a993698bca
SHA256
12bc842bc567ad14d9a42b0724a38f43885381e35f305f9a6cca7859ad8361b2
SHA512
db9f7da6485d68829e1f489ff79653c090a8a28d2f55b8c563fb37f38790c9183fbe7e8d81bd9eff3c0212be964e0ab9813bae83aebf7e38d381e34a5e013119
SSDEEP
1536:MhMIvDvBf2srWz5kE27RWn8hpZnGtU/gvgRCj0X:AQM8F2c87/gvgRCj4
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StrStrIA
PathFileExistsA
wnsprintfA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetCrackUrlA
InternetConnectA
HttpQueryInfoA
InternetOpenA
InternetCloseHandle
InternetGetConnectedState
HeapReAlloc
CreateFileA
lstrcmpA
lstrlenA
FreeLibrary
HeapAlloc
GetCurrentProcess
HeapFree
WaitForSingleObject
SleepEx
GetProcessHeap
WriteFile
TerminateThread
CreateProcessA
GetLastError
GetProcAddress
LoadLibraryA
CreateMutexA
ReleaseMutex
CloseHandle
GetTempPathA
LocalFree
CreateThread
GetComputerNameA
GetVolumeInformationA
GetSystemTimeAsFileTime
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
Sleep
GetCommandLineA
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
RaiseException
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
GetModuleHandleA
HeapSize
RegSetValueExA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
GetLengthSid
DuplicateTokenEx
ConvertStringSidToSidW
SetTokenInformation
OpenProcessToken
RegOpenKeyA
NP_GetEntryPoints
NP_GetMIMEDescription
NP_Initialize
NP_Shutdown
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ