DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a296a4dde2c9f70536e043d90f73f42a45810d230ebcc3533b0cfe4957178193.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a296a4dde2c9f70536e043d90f73f42a45810d230ebcc3533b0cfe4957178193.dll
Resource
win10v2004-20220812-en
Target
a296a4dde2c9f70536e043d90f73f42a45810d230ebcc3533b0cfe4957178193
Size
39KB
MD5
7494dcca53a098c7830760fea3201a41
SHA1
312ffdf036e13b57ecaec910ee92933dcf9e0fa5
SHA256
a296a4dde2c9f70536e043d90f73f42a45810d230ebcc3533b0cfe4957178193
SHA512
34874df40f85d97c4a755246abeb6fc58f20e6691a06eca8b145e967469f093e9940b627fd785c210922a6c98ef6dda24c518e0870c77951c3c876776f0cffd2
SSDEEP
384:Irpf8ELR3GJWdJ16HUT0j7vc2XIeZ4JiwiX2xr0RviXNrvJ+DjYmYdN785Z+0CQb:IZvWQ8HUT0jkowiwL6R+rIwsa0PrPy
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WSAStartup
gethostbyname
htonl
InternetCrackUrlA
MessageBoxA
RtlUnwind
InterlockedIncrement
InterlockedDecrement
FindClose
FindFirstFileA
WritePrivateProfileStringA
GetShortPathNameA
MoveFileExA
GetVersion
GetTickCount
MoveFileA
DeleteFileA
SetFileAttributesA
CopyFileA
GetTempPathA
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentProcessId
WideCharToMultiByte
InterlockedExchange
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
GetSystemTimeAsFileTime
VirtualQuery
ReadFile
GetFileSize
CreateFileA
WriteFile
IsBadStringPtrA
IsBadReadPtr
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleA
VirtualProtect
IsBadWritePtr
DeleteCriticalSection
SetLastError
GetLastError
InitializeCriticalSection
AreFileApisANSI
CloseHandle
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyExA
UuidCreate
UuidFromStringA
SHDeleteKeyA
ShellExecuteA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ