DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a67043ac23852a50fd94420de7ad94c7d9ecb256415479f925b99db6b7933e13.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a67043ac23852a50fd94420de7ad94c7d9ecb256415479f925b99db6b7933e13.dll
Resource
win10v2004-20220901-en
Target
a67043ac23852a50fd94420de7ad94c7d9ecb256415479f925b99db6b7933e13
Size
52KB
MD5
8a555bc08fadfe7bd0fa6f13af8d37d2
SHA1
eb62ad9c1de813155facb25c6b17e469ec9dfb85
SHA256
a67043ac23852a50fd94420de7ad94c7d9ecb256415479f925b99db6b7933e13
SHA512
fbc14b7c551a9f6ca0b33fb47b085f4c4bb5e5d073d980a8702a3e7ed5fe9622cc0ce49b7f5bf5ab9b3a45b465e4b2c716cc9ab2ad1c67f62eabf46d32badfe1
SSDEEP
384:CepB9v0Pba3a2RaJz4n5i5S2lXLbRnWaTqo8JYWH:CQxa2s94nw5SSn0aTqo
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleHandleA
LoadLibraryA
GetModuleFileNameA
WinExec
Sleep
SetEvent
OpenEventA
CreateThread
CreateEventA
TerminateProcess
GetCurrentProcess
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
GetPrivateProfileStringA
GetProcAddress
CloseHandle
GetCurrentProcessId
VirtualProtect
Module32First
Module32Next
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
ReadProcessMemory
OpenProcess
VirtualProtectEx
WriteProcessMemory
CreateToolhelp32Snapshot
wsprintfA
EnumWindows
GetWindowThreadProcessId
CallNextHookEx
SetWindowsHookExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
SysStringLen
LoadRegTypeLi
SysFreeString
ord15
ord16
ord23
ord18
ord57
ord32
ord58
ord30
ord21
StrStrIA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
strcat
_strcmpi
_adjust_fdiv
malloc
_initterm
free
memcmp
strrchr
??2@YAPAXI@Z
_itoa
??3@YAXPAX@Z
memset
strlen
isprint
sprintf
_purecall
strcpy
memcpy
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ