CleanAdWare
GetAdwareInfo
GetLastErrorMsg
InstAntiDrv
ScanAdware
Static task
static1
Behavioral task
behavioral1
Sample
3b75f073f743ebee8822de7996f0d516bb7062d1738c4ce0474040ac412cf401.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3b75f073f743ebee8822de7996f0d516bb7062d1738c4ce0474040ac412cf401.dll
Resource
win10v2004-20221111-en
Target
3b75f073f743ebee8822de7996f0d516bb7062d1738c4ce0474040ac412cf401
Size
88KB
MD5
f5e7d1b721db7db4c2ff568da452f7ce
SHA1
204e5c8efb4ce88b9da7b17a49915a94d2f224a5
SHA256
3b75f073f743ebee8822de7996f0d516bb7062d1738c4ce0474040ac412cf401
SHA512
89453301259be8a2a70909ec10fbdd83f2141d2361de23fe58fdbb72cad6b57857291815724e583683a20ac9039cf3d7503fc95e78f24907a8f0e5599dd5e235
SSDEEP
1536:lagNIv2hLUxZuNz0gupfFvq2S3OMUKRm27wbdpER:0v2hQxZIIgupfLS+xsp7w5pq
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
InternetOpenA
HttpQueryInfoA
InternetGetConnectedState
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
timeGetTime
ord3831
ord3825
ord3079
ord4080
ord4424
ord3626
ord2414
ord1175
ord283
ord941
ord4284
ord6215
ord4275
ord5787
ord1168
ord6883
ord2614
ord1200
ord939
ord4202
ord6877
ord4204
ord5651
ord2818
ord3616
ord6385
ord1979
ord5186
ord350
ord922
ord923
ord3830
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord823
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord3953
ord2044
ord537
ord354
ord3790
ord665
ord860
ord6927
ord6929
ord2764
ord4129
ord5710
ord535
ord2448
ord858
ord825
ord540
ord800
ord3663
ord1197
ord1243
ord342
ord1182
ord1577
ord1575
ord1176
ord1116
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord6143
ord5861
ord801
ord541
ord6383
ord5440
ord6394
ord5450
ord5834
ord1570
ord1253
ord1255
ord6467
ord1578
ord600
ord826
ord269
ord3127
ord2396
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_onexit
__dllonexit
malloc
free
remove
fread
_ftol
rename
strchr
sprintf
fopen
fwrite
fclose
fflush
strrchr
_fcloseall
_mbscmp
__CxxFrameHandler
CreateFileA
GetSystemDirectoryA
GetCurrentDirectoryA
GetProcessHeap
HeapAlloc
SetCurrentDirectoryA
FindNextFileA
HeapFree
FindFirstFileA
FindClose
RemoveDirectoryA
GetCurrentProcessId
GetWindowsDirectoryA
CreateDirectoryA
MoveFileA
SetFileAttributesA
CopyFileA
GetShortPathNameA
WinExec
Sleep
DeleteFileA
LocalAlloc
lstrlenA
TerminateProcess
WaitForSingleObject
GetCurrentProcess
DuplicateHandle
GetLastError
LocalFree
FreeLibrary
Process32First
GetPriorityClass
Process32Next
GetVersionExA
CreateToolhelp32Snapshot
Module32First
Module32Next
OpenProcess
LoadLibraryA
GetProcAddress
CloseHandle
GetModuleFileNameA
SetDlgItemTextA
SendDlgItemMessageA
GetDesktopWindow
SetForegroundWindow
IsWindowVisible
UpdateWindow
IsWindow
GetSysColor
SendMessageA
PatBlt
RegQueryValueExA
SetSecurityInfo
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetTokenInformation
OpenProcessToken
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegEnumKeyExA
RegEnumValueA
OpenSCManagerA
CloseServiceHandle
CreateServiceA
DeleteService
OpenServiceA
StartServiceA
ControlService
SHFileOperationA
SHGetSpecialFolderPathA
?get@istream@@IAEAAV1@PADHH@Z
_mtunlock
??0ifstream@@QAE@XZ
?openprot@filebuf@@2HB
?open@ifstream@@QAEXPBDHH@Z
??1ifstream@@UAE@XZ
??1ios@@UAE@XZ
?close@ifstream@@QAEXXZ
??_Difstream@@QAEXXZ
_mtlock
CleanAdWare
GetAdwareInfo
GetLastErrorMsg
InstAntiDrv
ScanAdware
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ