DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
94e977d6a302110a0a8a27a3738d965abfed8373e3747a1717692561c3915c94.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94e977d6a302110a0a8a27a3738d965abfed8373e3747a1717692561c3915c94.dll
Resource
win10v2004-20220812-en
Target
94e977d6a302110a0a8a27a3738d965abfed8373e3747a1717692561c3915c94
Size
44KB
MD5
45cbd08b6013f370711e7177719b7163
SHA1
617636131e080e9143a92b94f595f7e31b652bc3
SHA256
94e977d6a302110a0a8a27a3738d965abfed8373e3747a1717692561c3915c94
SHA512
526ff0f3e0a6e8fc51272aac59376c783b2ecfa0ce99243b9d84f51f917cff580a97838e7701ddcf50fc8952d445e57f96430ed2412be8d5435f34b978887841
SSDEEP
384:nOdR3wBCcN0Pba3SdQeoWKbpvLLjBS9sk6UohQr8/K:nIRZc/h0SpDLjBSjzohQr
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
WinExec
GetModuleFileNameA
SetEvent
OpenEventA
CreateThread
CreateEventA
TerminateProcess
GetCurrentProcess
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
LoadLibraryA
GetProcAddress
lstrcpyA
GetCurrentProcessId
CloseHandle
VirtualProtect
Module32First
Module32Next
lstrlenW
lstrlenA
OpenProcess
VirtualProtectEx
WriteProcessMemory
CreateToolhelp32Snapshot
Sleep
wsprintfA
CallNextHookEx
MapVirtualKeyA
ToAscii
SetWindowsHookExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
SysFreeString
LoadRegTypeLi
SysStringLen
isprint
strcpy
strrchr
strcat
??2@YAPAXI@Z
memcpy
_purecall
memcmp
atoi
free
_initterm
malloc
_adjust_fdiv
_strcmpi
strcmp
??3@YAXPAX@Z
memset
strlen
sprintf
_itoa
ord21
ord16
ord15
ord18
ord57
ord32
ord58
ord30
ord23
StrStrIA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ