DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f5f239e832892ff20db73e9f82507c48d1a4ca09f7a90d3de58d4584c03438f5.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f5f239e832892ff20db73e9f82507c48d1a4ca09f7a90d3de58d4584c03438f5.dll
Resource
win10v2004-20220901-en
Target
f5f239e832892ff20db73e9f82507c48d1a4ca09f7a90d3de58d4584c03438f5
Size
210KB
MD5
0e1a8d7a588a6d0dddde8f86153a74ac
SHA1
bf35841a02558e7239e9275b7e5b1f80666dad3a
SHA256
f5f239e832892ff20db73e9f82507c48d1a4ca09f7a90d3de58d4584c03438f5
SHA512
8947e81a32c42abbd18c8f50eecc65542e247380ae2890d421037804e2543141a04c12bcf0a64eaccb1c2500986f49ce5e56a083f1e8affbae5f9c0b91f7f2ce
SSDEEP
3072:yuhE6zRkchNDCDkcwFLb/9CZtzLIq01wnkvYSg7dHLV/k3tZ9k82yrnd+2jWA:yuhBNDtrHMzgL1wk6BMtZ/2yAhA
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindResourceA
lstrcmpA
lstrlenA
LoadResource
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
GetVolumeInformationA
SizeofResource
GetProcAddress
VirtualAlloc
LoadLibraryA
LockResource
VirtualProtect
lstrcpyA
GetCurrentThreadId
GetCommandLineA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ