DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
1c52026541cc8014df62355941f37202d0a9ac811a54aec50f3a60189e253a52.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c52026541cc8014df62355941f37202d0a9ac811a54aec50f3a60189e253a52.dll
Resource
win10v2004-20220812-en
Target
1c52026541cc8014df62355941f37202d0a9ac811a54aec50f3a60189e253a52
Size
64KB
MD5
633d7d7ac530ff1f2130e33d9858e210
SHA1
8894ae89bc76163c16164bbb1ad90bfb58f226ef
SHA256
1c52026541cc8014df62355941f37202d0a9ac811a54aec50f3a60189e253a52
SHA512
3189e26c0929835cb54ea7bf2948071b85a9fb54684b98aaa1d07832f39d5c63f8fa9f807f17c5754675eebb0adcc25842a4dd2dd83d1a07096e6506970c050d
SSDEEP
384:RwMLUhUnMUv0Pba3aTTvTlEj/hTulS1lx+yfyJfRn3MwbAc34BtxiX7:RahUXxa/vTlEj/hTukRvqJfBM2A0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindClose
FindFirstFileA
GetModuleHandleA
LoadLibraryA
GetModuleFileNameA
WinExec
Sleep
SetEvent
OpenEventA
CreateThread
CreateEventA
TerminateProcess
GetCurrentProcess
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
IsBadReadPtr
GetPrivateProfileStringA
GetCurrentDirectoryA
GetProcAddress
CloseHandle
GetCurrentProcessId
VirtualAlloc
VirtualProtect
Module32First
Module32Next
lstrlenW
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
ReadProcessMemory
OpenProcess
VirtualProtectEx
WriteProcessMemory
CreateToolhelp32Snapshot
wsprintfA
EnumWindows
SetWindowsHookExA
GetWindowThreadProcessId
SetTimer
KillTimer
CallNextHookEx
RegOpenKeyA
RegSetValueExA
RegCloseKey
SysFreeString
LoadRegTypeLi
SysStringLen
isprint
sprintf
_purecall
memcpy
strcat
strrchr
??2@YAPAXI@Z
atoi
free
_initterm
malloc
_adjust_fdiv
strcpy
strcmp
??3@YAXPAX@Z
memset
strlen
memcmp
_strcmpi
ord21
ord16
ord15
ord18
ord57
ord32
ord58
ord30
ord23
StrStrIA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ