LidCheck
LidCheckSz
LidInit
LidLanguages
LidTerminate
LidVersion
Static task
static1
Behavioral task
behavioral1
Sample
bf98d297d9fadd7b6b7c6f8a8c71e2a13bc8602f34ecb6f7b8e9c6704dfcccb0.dll
Resource
win7-20220812-en
Target
bf98d297d9fadd7b6b7c6f8a8c71e2a13bc8602f34ecb6f7b8e9c6704dfcccb0
Size
584KB
MD5
45ffc8f1c755d790d8549f6ce7aa3490
SHA1
13921b6b5aa0983c189c1cdd3a6df5d03c15890b
SHA256
bf98d297d9fadd7b6b7c6f8a8c71e2a13bc8602f34ecb6f7b8e9c6704dfcccb0
SHA512
89c5e638b368280c0379f776dadcba8895623c9a7c72e28f36b916b6c8dd6c07a14d56205d117dcd76b34c96bdeedad3dd44b302110fd3d42820f26a3263067f
SSDEEP
12288:tfpbSCj3i58Z87qAiRFyKFTLXif26z0ayMMrnXVN5:tfpbvcqA6ZQR0RbXVN
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FindResourceW
IsBadWritePtr
lstrlenW
IsBadReadPtr
LoadResource
LockResource
GlobalHandle
GlobalFree
GlobalAlloc
DisableThreadLibraryCalls
FreeResource
SetLastError
GetCPInfo
GetACP
SetStdHandle
CloseHandle
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
GlobalLock
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
VirtualFree
SetFilePointer
GetOEMCP
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
HeapDestroy
HeapCreate
HeapAlloc
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
VirtualAlloc
LoadLibraryA
FlushFileBuffers
ReleaseDC
GetSysColor
GetDC
GetTextColor
DeleteObject
DeleteDC
SetTextColor
CreateCompatibleBitmap
CreateCompatibleDC
LidCheck
LidCheckSz
LidInit
LidLanguages
LidTerminate
LidVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE