DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8f9a44a78e108ece82855501961ef3f6b52d5f4c1efe19acef4db0d54c58f23a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8f9a44a78e108ece82855501961ef3f6b52d5f4c1efe19acef4db0d54c58f23a.dll
Resource
win10v2004-20221111-en
Target
8f9a44a78e108ece82855501961ef3f6b52d5f4c1efe19acef4db0d54c58f23a
Size
52KB
MD5
c2073258fcf8a0fea61dc116954b3be2
SHA1
ea772d22e17f40aabc444e823bacfe8d984fa953
SHA256
8f9a44a78e108ece82855501961ef3f6b52d5f4c1efe19acef4db0d54c58f23a
SHA512
603a0e894550b481ffbfb3a82afd8642462d5bd70420257096233ae71e3b446942ae300ab199bd36508afb93e7dde0b665c93d8602d1a2bf2d5807215e230f3b
SSDEEP
384:EGBaJsODiPEuQMajWp8/os4jN7QJ0Pba31yk3b4q9XcU2l/5edmn14klXi1StZHu:EGBaJ7mkMWmKsVQj133FOP5DlBUSt
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
lstrlenW
DeleteFileA
GetModuleHandleA
GetProcAddress
ExitProcess
GetFileSize
SetFilePointer
WriteFile
ReadFile
CreateFileA
FindClose
VirtualProtect
GetDriveTypeA
lstrlenA
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
FreeLibrary
GetLastError
WritePrivateProfileStringA
GetPrivateProfileStringA
DisableThreadLibraryCalls
GetCurrentProcess
TerminateProcess
GetWindowsDirectoryA
CreateEventA
CreateThread
WinExec
FindFirstFileA
Sleep
OpenEventA
SetEvent
CloseHandle
GetModuleFileNameA
FindNextFileA
CallNextHookEx
SetWindowsHookExA
MessageBoxA
wsprintfA
RegSetValueExA
RegOpenKeyA
RegCloseKey
LoadRegTypeLi
SysFreeString
SysStringLen
memcpy
_purecall
memcmp
strstr
_stricmp
strrchr
strcmp
atol
sprintf
??2@YAPAXI@Z
_initterm
malloc
_adjust_fdiv
_strlwr
_itoa
_strcmpi
??3@YAXPAX@Z
strcat
strcpy
memset
strlen
free
ord15
ord16
ord21
ord18
ord57
ord32
ord58
ord30
ord23
DeleteUrlCacheEntry
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ