DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
TBStudioReg
Static task
static1
Behavioral task
behavioral1
Sample
2dae838574c19aa327c16cd508436cad1be76dab57057fe7eec46711a474cb7e.dll
Resource
win7-20220414-en
Target
2dae838574c19aa327c16cd508436cad1be76dab57057fe7eec46711a474cb7e
Size
484KB
MD5
4d3902ac9c8a0a3b3756b9476873d395
SHA1
eb0c66271ea08485ff7683bee33b9b897b12517a
SHA256
2dae838574c19aa327c16cd508436cad1be76dab57057fe7eec46711a474cb7e
SHA512
7d348509a07e3b1f73958e02ae109da3ed38431c13d5072e8231c68d54a75addbd3d4cecf8d13e027c7fcacfc60aab3235e375f84ef3971f0fcce7fd3f044148
SSDEEP
12288:mRSz41V0v8PyZ6yrVRdjV5CritKd56J/qB0bxOB0kpVmEeost6922Zd52:mRSz41VFyZXV5CT352
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PlaySoundA
PathFileExistsA
DeleteUrlCacheEntry
HttpQueryInfoA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
SetupIterateCabinetA
SetLastError
GetLastError
GetProcAddress
LoadLibraryA
OutputDebugStringA
LoadLibraryW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
lstrcpyA
lstrcatA
GetCurrentProcessId
Sleep
GlobalUnlock
GlobalLock
LeaveCriticalSection
EnterCriticalSection
lstrlenW
TerminateThread
DebugBreak
GetVersion
FindFirstFileA
GetModuleFileNameA
FreeLibrary
GetTempFileNameA
FlushInstructionCache
GetCurrentProcess
GetVersionExA
lstrcmpA
GetCurrentThreadId
GetShortPathNameA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
DisableThreadLibraryCalls
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
SetEndOfFile
CompareStringA
CompareStringW
WideCharToMultiByte
MultiByteToWideChar
MoveFileExA
GetTempPathA
CreateFileA
WriteFile
CloseHandle
InterlockedIncrement
DeleteFileA
RemoveDirectoryA
lstrlenA
InterlockedDecrement
FindNextFileA
FindClose
GlobalAlloc
ReadFile
SetHandleCount
LCMapStringA
GetDriveTypeA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
SetUnhandledExceptionFilter
HeapSize
TerminateProcess
ExitProcess
TlsGetValue
TlsFree
TlsAlloc
GetCommandLineA
HeapReAlloc
HeapAlloc
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
GetFullPathNameA
GetLocalTime
GetSystemTime
GetTimeZoneInformation
ExitThread
TlsSetValue
CreateThread
ResumeThread
CreateDirectoryA
HeapFree
RtlUnwind
RaiseException
LocalAlloc
InterlockedExchange
LocalFree
LCMapStringW
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
SetFilePointer
GetStartupInfoA
GetFileType
GetStdHandle
SendMessageA
wsprintfA
UnhookWindowsHookEx
GetParent
CharLowerA
SetCapture
MessageBoxA
CharNextA
DefWindowProcA
IsWindowVisible
CloseClipboard
GetClipboardData
OpenClipboard
GetSysColor
SetWindowTextA
GetSystemMetrics
LoadCursorA
RegisterWindowMessageA
RegisterClassExA
GetClassInfoExA
GetWindow
SetWindowLongA
GetWindowTextA
GetWindowTextLengthA
GetWindowLongA
DestroyCursor
EnableMenuItem
PostMessageA
UnregisterClassA
TranslateMessage
DispatchMessageA
MoveWindow
GetWindowRect
EmptyClipboard
LoadCursorFromFileA
CreateWindowExA
GetDlgItem
InvalidateRgn
IsWindow
ReleaseCapture
DestroyAcceleratorTable
CreateAcceleratorTableA
GetDesktopWindow
RedrawWindow
SetWindowPos
EndPaint
IsChild
CallWindowProcA
GetDC
ReleaseDC
FillRect
DrawEdge
OffsetRect
GetMenuItemInfoA
CopyRect
DestroyWindow
SetFocus
ShowWindow
LoadMenuA
GetSubMenu
InsertMenuA
MapWindowPoints
LoadImageA
GetMessagePos
GetCursorPos
GetFocus
SetWindowsHookExA
LoadStringA
WindowFromPoint
SetCursor
ScreenToClient
PtInRect
GetKeyState
GetClassNameA
CallNextHookEx
InvalidateRect
wvsprintfA
TrackPopupMenu
SetTimer
CreatePopupMenu
AppendMenuA
CheckMenuItem
DestroyMenu
KillTimer
GetClientRect
BeginPaint
SetActiveWindow
GetObjectA
DeleteObject
ExtTextOutA
GetTextExtentPoint32A
GetTextMetricsA
SetTextColor
SetBkColor
SetBkMode
SelectObject
CreateBrushIndirect
DeleteDC
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
GetDeviceCaps
GetStockObject
GetTextExtentPointA
CreateFontA
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
SHAddToRecentDocs
SHEmptyRecycleBinA
ShellExecuteA
OleInitialize
CLSIDFromProgID
CoCreateInstance
CoCreateGuid
OleUninitialize
CLSIDFromString
CoUninitialize
CoTaskMemFree
StringFromCLSID
CoTaskMemAlloc
OleLockRunning
RegisterDragDrop
ReleaseStgMedium
CoTaskMemRealloc
OleRun
CreateStreamOnHGlobal
CoInitialize
SysAllocString
VariantClear
SysAllocStringByteLen
SysFreeString
LoadTypeLi
SysStringByteLen
VariantInit
VariantChangeType
VariantCopy
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
LoadRegTypeLi
DispCallFunc
OleCreateFontIndirect
SafeArrayCreate
VarUI4FromStr
RegisterTypeLi
GetErrorInfo
SysAllocStringLen
SysStringLen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
TBStudioReg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ