DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
859b4314230c82028d9f8c372f4c139055d580de0bf153a7f8d1c1bd05726ea6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
859b4314230c82028d9f8c372f4c139055d580de0bf153a7f8d1c1bd05726ea6.dll
Resource
win10v2004-20220901-en
Target
859b4314230c82028d9f8c372f4c139055d580de0bf153a7f8d1c1bd05726ea6
Size
156KB
MD5
68e581a21c07db7f7c0dc0e022f37a20
SHA1
279f6c3448138a0aabb9272cdf103c41e35ecfcb
SHA256
859b4314230c82028d9f8c372f4c139055d580de0bf153a7f8d1c1bd05726ea6
SHA512
2347686ecf23f0675e084efda907e2b6d4ea74dc13852cf1da89cb4c823987c2e2b9b3084727eb759487d24ab9ebd1e4a5263c0c5d87a4bd80f66b7802122c97
SSDEEP
3072:kuhE6zRkfC1C9n2T5JEW9ytOHsHYRf9gNR5hXRzJrvC:kuhOC1XXmYRFgNXtrvC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindResourceA
lstrcmpA
lstrlenA
LoadResource
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
GetVolumeInformationA
SizeofResource
GetProcAddress
VirtualAlloc
LoadLibraryA
LockResource
VirtualProtect
lstrcpyA
GetCurrentThreadId
GetCommandLineA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ