DllCanUnloadNow
DllGetClassObject
DllPreTranslateMessage
Static task
static1
Behavioral task
behavioral1
Sample
aa10c6c886272234bd92863f599f9558250e81ac316e03ccfc54e1f88ba527c2.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aa10c6c886272234bd92863f599f9558250e81ac316e03ccfc54e1f88ba527c2.dll
Resource
win10v2004-20220812-en
Target
aa10c6c886272234bd92863f599f9558250e81ac316e03ccfc54e1f88ba527c2
Size
51KB
MD5
24809a57242e0a178f3646330cab3790
SHA1
7d449f65f00f4c46d02e9578607f1a3c79bf83fe
SHA256
aa10c6c886272234bd92863f599f9558250e81ac316e03ccfc54e1f88ba527c2
SHA512
c114e9dfac1c7864f80b6bedb109e403d3d3c9f8e5c49fa64d5beb7c1d1807aac8c3816ac0e744ed99a941e6e6f0711b1d0925614d7b0a75495fe52e478819b2
SSDEEP
768:keYiY4baIbMSoPF0FSn+hhORX9iLMFaN88345LQxGOsIZrKSA0ukMtXrqD5oKEA:vM7IASjo+QX9OP88OLQx1sUrz3ZD9l
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CoInitialize
StgOpenStorage
CoUninitialize
GetProcessWindowStation
GetUserObjectInformationA
CloseWindowStation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetModuleFileNameExA
_adjust_fdiv
malloc
_initterm
_snprintf
_memicmp
memcpy
strrchr
memset
free
GetLastError
InterlockedIncrement
MapViewOfFile
UnmapViewOfFile
DisableThreadLibraryCalls
CreateFileMappingA
CreateMutexA
CreateThread
IsBadReadPtr
LoadLibraryA
GetProcAddress
OpenProcess
TerminateProcess
CloseHandle
VirtualAlloc
lstrcpyA
GetFileAttributesA
MultiByteToWideChar
LocalAlloc
VirtualFree
LocalFree
DllCanUnloadNow
DllGetClassObject
DllPreTranslateMessage
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ