DllCanUnloadNow
DllGetClassObject
DllPreTranslateMessage
Static task
static1
Behavioral task
behavioral1
Sample
a626ccfb71b38ad5090cd2ed45c87b4dae24aab126fb10d63f12b3d6f68ea809.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a626ccfb71b38ad5090cd2ed45c87b4dae24aab126fb10d63f12b3d6f68ea809.dll
Resource
win10v2004-20221111-en
Target
a626ccfb71b38ad5090cd2ed45c87b4dae24aab126fb10d63f12b3d6f68ea809
Size
61KB
MD5
185d0b7a747e4ced5053ef9f3d294370
SHA1
c368cd80bf834193459372ba665098a4a39c2347
SHA256
a626ccfb71b38ad5090cd2ed45c87b4dae24aab126fb10d63f12b3d6f68ea809
SHA512
71997cd600210aad998219594eafe929704f55a72241c424b42fe9e9ad4210a72763b949647d90ed8183b385e72b7694d0b5613c2cd7b484f38ea6643fe81a6d
SSDEEP
1536:BCO5vV3LWAxkjM9rh6jKHL3ziiq4efPgMt+kC:p58BjMdJzfq4UFC
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CoInitialize
StgOpenStorage
CoUninitialize
GetProcessWindowStation
GetUserObjectInformationA
CloseWindowStation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetModuleFileNameExA
_adjust_fdiv
malloc
free
_snprintf
_memicmp
memcpy
strrchr
memset
_initterm
GetLastError
InterlockedIncrement
CreateFileMappingA
MapViewOfFile
DisableThreadLibraryCalls
OpenFileMappingA
CreateMutexA
UnmapViewOfFile
CreateThread
VirtualAlloc
LoadLibraryA
GetProcAddress
OpenProcess
TerminateProcess
CloseHandle
IsBadReadPtr
lstrcpyA
GetFileAttributesA
MultiByteToWideChar
VirtualFree
LocalAlloc
LocalFree
DllCanUnloadNow
DllGetClassObject
DllPreTranslateMessage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ