?COMWndProc@@YGJPAUHWND__@@IIJ@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ef7f475a185cd291fc687eecfb7328afbc2ba907ee337420fc733cb96aa1a8fa.dll
Resource
win7-20220812-en
Target
ef7f475a185cd291fc687eecfb7328afbc2ba907ee337420fc733cb96aa1a8fa
Size
343KB
MD5
6b4808615bcef709623cc966088859f0
SHA1
99d9c42886c58418f4e4203149e4595221a8ea0c
SHA256
ef7f475a185cd291fc687eecfb7328afbc2ba907ee337420fc733cb96aa1a8fa
SHA512
c30aca5014b510ae4c65724156eb53c1b6d3a45c59ff84f23387d190cf4dc213e5e7014bffbb06c32588787a3d7af26ae53a421c827d88cb16c6d11527a2dbd7
SSDEEP
6144:SxzOH5rlw63jVvMizeZ+1BLPUZTaDT7UFTYmn0HxIr:rBlFjVvM4SM6Ta/6cm06
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
lstrcmpiA
DisableThreadLibraryCalls
GetModuleFileNameA
GetProcAddress
GetModuleHandleW
IsDBCSLeadByte
FreeLibrary
LoadLibraryExA
GetModuleHandleA
WritePrivateProfileStringA
LocalFree
GetPrivateProfileIntA
GetPrivateProfileStringA
LocalAlloc
MulDiv
GetTickCount
lstrcpyA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
OutputDebugStringA
GetCurrentThreadId
FormatMessageA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetPrivateProfileSectionNamesA
FindClose
FindNextFileA
DeleteFileA
ReleaseMutex
FindFirstFileA
WaitForSingleObject
CreateMutexA
ReadFile
LocalReAlloc
LocalSize
LocalUnlock
LocalLock
lstrcpynA
LoadLibraryA
SetErrorMode
CreateDirectoryA
GetFileAttributesA
GetShortPathNameA
RemoveDirectoryA
CompareStringA
GetTimeZoneInformation
InterlockedExchange
InitializeCriticalSectionAndSpinCount
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
lstrlenA
GetStringTypeA
GetLocaleInfoA
GetLocaleInfoW
SetConsoleCtrlHandler
GetStringTypeW
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
HeapSize
ExitProcess
Sleep
HeapDestroy
HeapCreate
HeapReAlloc
VirtualFree
FatalAppExitA
IsValidCodePage
InterlockedDecrement
InterlockedIncrement
GetLastError
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
RaiseException
lstrlenW
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
GetCurrentThread
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
GetFullPathNameA
GetDriveTypeA
CreateThread
ExitThread
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
WideCharToMultiByte
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
SizeofResource
GetTimeFormatA
CompareStringW
MsgWaitForMultipleObjects
CharNextA
CharNextW
EnableWindow
IsWindowEnabled
GetDlgItem
SetRect
GetSystemMetrics
SystemParametersInfoA
SetWindowPos
GetParent
LoadStringA
GetWindowRect
RegisterClassA
CreateWindowExA
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetForegroundWindow
wsprintfA
IsIconic
ShowWindow
LoadCursorA
PostQuitMessage
GetWindowLongA
DefWindowProcA
SetWindowLongA
TranslateMessage
DispatchMessageA
PostMessageA
PeekMessageA
GetDC
ReleaseDC
IsWindow
RegQueryInfoKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegEnumKeyExA
RegDeleteKeyA
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
GetRunningObjectTable
MkParseDisplayName
CreateBindCtx
ProgIDFromCLSID
CoGetInstanceFromFile
CreateFileMoniker
CreateErrorInfo
SetErrorInfo
VarBstrCat
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringByteLen
SysAllocStringByteLen
SysAllocString
VariantCopy
VariantClear
VariantInit
SysFreeString
SysAllocStringLen
VarBstrCmp
SysStringLen
GetDeviceCaps
GetTextMetricsA
SelectObject
GetObjectA
CreateFontIndirectA
GetStockObject
?COMWndProc@@YGJPAUHWND__@@IIJ@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE