BootstrapperApplicationCreate
BootstrapperApplicationDestroy
MbaPrereqBootstrapperApplicationCreate
MbaPrereqBootstrapperApplicationDestroy
Static task
static1
Behavioral task
behavioral1
Sample
f808d95e0a6b80c4bfff4b993c7106ae31f449d2f47927ed18baed94bb294cd8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f808d95e0a6b80c4bfff4b993c7106ae31f449d2f47927ed18baed94bb294cd8.dll
Resource
win10v2004-20220812-en
Target
f808d95e0a6b80c4bfff4b993c7106ae31f449d2f47927ed18baed94bb294cd8
Size
235KB
MD5
67650a95256d69e7dbd5e5d7ac5405f0
SHA1
510971947e210fec9f8a03c263c492d7c20a55b2
SHA256
f808d95e0a6b80c4bfff4b993c7106ae31f449d2f47927ed18baed94bb294cd8
SHA512
e0fe780bf9fff841942abdcbc3c07010f10ed72c390560a9d0defa8b43471f371303b5d257bca8f65ff850d2c6b922f3c153afbd85f16839eb23e8fede05ee97
SSDEEP
6144:jFEf9+t57IMldmpN+EE3+byqHEalxggprkkorwNu3:jF29w57IMDmE1YEaXggp2wI
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
LoadResource
SizeofResource
LockResource
GetFileSizeEx
GlobalAlloc
GlobalFree
FindFirstFileW
FindClose
GetProcessHeap
GetLastError
FindResourceExA
CompareStringW
WaitForSingleObject
CloseHandle
InitializeCriticalSection
EnterCriticalSection
GetModuleFileNameW
GetModuleHandleA
CreateFileW
ReadFile
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetSystemDirectoryW
LoadLibraryW
FormatMessageW
lstrlenA
GlobalUnlock
GlobalLock
DisableThreadLibraryCalls
CreateThread
GetModuleHandleW
Sleep
LocalFree
SetThreadLocale
lstrlenW
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
GetCurrentThreadId
GetCommandLineA
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RaiseException
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
HeapSize
FreeLibrary
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
FlushFileBuffers
CoUninitialize
CoTaskMemFree
CoCreateInstance
CLSIDFromProgID
CreateStreamOnHGlobal
CoInitialize
BeginPaint
SetFocus
GetUpdateRect
GetNextDlgTabItem
GetKeyState
DefWindowProcW
LoadImageW
EndPaint
DrawFocusRect
GetMessageW
SetCursor
DispatchMessageW
LoadIconW
LoadCursorW
RegisterClassW
GetCursorPos
MonitorFromPoint
GetMonitorInfoW
CreateWindowExW
GetWindowLongW
GetClassLongA
PostQuitMessage
PostMessageW
SendMessageW
IsWindow
DestroyWindow
UnregisterClassW
RegisterWindowMessageW
MessageBoxW
CloseWindow
GetWindowTextW
InvalidateRect
KillTimer
SetTimer
GetClassInfoW
LoadCursorA
SetClassLongA
TranslateMessage
SetWindowLongW
EnableWindow
GetClientRect
IsDialogMessageW
IsWindowEnabled
GetDlgItem
ShowWindow
SetWindowTextW
SHAutoComplete
GetOpenFileNameW
ImageList_Create
ImageList_Add
InitCommonControlsEx
ImageList_Destroy
ShellExecuteExW
CommandLineToArgvW
SHGetPathFromIDListW
SHBrowseForFolderW
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdiplusShutdown
GdipCreateHBITMAPFromBitmap
GdiplusStartup
GdipFree
GdipDisposeImage
CreateSolidBrush
GetObjectW
SetBkMode
GetStockObject
DeleteObject
SetTextColor
SetBkColor
ExtTextOutW
CreateCompatibleDC
SelectObject
StretchBlt
DeleteDC
CreateFontIndirectW
VariantClear
SysAllocString
SysFreeString
VariantInit
BootstrapperApplicationCreate
BootstrapperApplicationDestroy
MbaPrereqBootstrapperApplicationCreate
MbaPrereqBootstrapperApplicationDestroy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE