DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
48fb4903eacb6cad3a607c74a519903167b6c92a46edaf5d2f7c1bd6bf4e1803.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48fb4903eacb6cad3a607c74a519903167b6c92a46edaf5d2f7c1bd6bf4e1803.dll
Resource
win10v2004-20220812-en
Target
48fb4903eacb6cad3a607c74a519903167b6c92a46edaf5d2f7c1bd6bf4e1803
Size
210KB
MD5
90555abfbbd0054a4081533e47f5e220
SHA1
b7105dd98b744184be27e202f56236d81d9f748f
SHA256
48fb4903eacb6cad3a607c74a519903167b6c92a46edaf5d2f7c1bd6bf4e1803
SHA512
d59832055afc0a08180d75d126c89fd7ed5add15e5feca1807e1e706decfc5416231e38991391d48cd8e56c7c2890de49dbe856dd0fc7f18b4c262f1bdb8e783
SSDEEP
6144:yuh422wUrh0p+J9cZtspaAwvl+ID6rhIhiuTm:yuGXwI0PZtEh6jWhJuTm
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindResourceA
lstrcmpA
lstrlenA
LoadResource
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
GetVolumeInformationA
SizeofResource
GetProcAddress
VirtualAlloc
LoadLibraryA
LockResource
VirtualProtect
lstrcpyA
GetCurrentThreadId
GetCommandLineA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ