DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6f844c121cdd98f416108c3bf842575d84c58b8e3fc54372aa771099f0a4a709.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6f844c121cdd98f416108c3bf842575d84c58b8e3fc54372aa771099f0a4a709.dll
Resource
win10v2004-20220901-en
Target
6f844c121cdd98f416108c3bf842575d84c58b8e3fc54372aa771099f0a4a709
Size
141KB
MD5
4a65b98c44e8c55cc2fe926dca810786
SHA1
0e3f954eca55d5eaab5d7672d9a5eb8f014f76cc
SHA256
6f844c121cdd98f416108c3bf842575d84c58b8e3fc54372aa771099f0a4a709
SHA512
7106ee224ee47827cfcd7cb6f34a7c0cf5018e92cd48a712394da487d8efd1e6c38f1c1b8c66270f33a9b7e14721dfd6d3cdc95493c0e8e4c8d378f1a3ff0d29
SSDEEP
1536:HG/w8HEhSpC6zRk2bH5fjvHOhNRsyHB0syhlCPVUfUzvP0CzqMpqERwxV1uKtCLj:HuhE6zRkyzcd2lCdaUrcIzhNQHt+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FindResourceA
lstrcmpA
lstrlenA
LoadResource
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
GetVolumeInformationA
SizeofResource
GetProcAddress
VirtualAlloc
LoadLibraryA
LockResource
VirtualProtect
lstrcpyA
GetCurrentThreadId
GetCommandLineA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ