LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
MyNewFun
ftsWordBreak
wintest
Behavioral task
behavioral1
Sample
dfaeff9ce3a82b4ad375b26a6e8376acbe9a5ab8b1623be4e2730b3ef52e6a20.dll
Resource
win7-20220812-en
Target
dfaeff9ce3a82b4ad375b26a6e8376acbe9a5ab8b1623be4e2730b3ef52e6a20
Size
891KB
MD5
6521d28fac53d6ad805693103405c937
SHA1
2968a04acb878744d06d9736b6956e7af72fb731
SHA256
dfaeff9ce3a82b4ad375b26a6e8376acbe9a5ab8b1623be4e2730b3ef52e6a20
SHA512
2fe226f1158ad5cc40ec546f123a13456b3584890d0ddddf11ba02ce82cfa4ccc78a6e76f114a21aaef0b35cb0e02cc540e9902158e227ab215cfb5543b50c97
SSDEEP
3072:pUEiA0vSdDv3/68hBaTSRx7HVUxMS/SM6s74:qEb0uvC8X+6HVUxMS/Go4
resource | yara_rule |
---|---|
sample | family_gh0strat |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
DuplicateHandle
OpenEventA
SetErrorMode
GetCurrentProcess
GlobalSize
CreateMutexA
ExpandEnvironmentStringsA
DisableThreadLibraryCalls
LocalSize
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GlobalFree
UnmapViewOfFile
HeapAlloc
GlobalAlloc
GlobalLock
GetLogicalDriveStringsA
GlobalUnlock
GetDriveTypeA
GetModuleFileNameA
CopyFileA
SetFileAttributesA
Process32First
Process32Next
GetSystemDirectoryA
CreateFileMappingA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetDiskFreeSpaceExA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
FreeLibrary
lstrcatA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
LoadLibraryA
GetProcAddress
VirtualAlloc
EnterCriticalSection
CreateEventA
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
MapViewOfFile
GetProcessHeap
HeapFree
GetLocalTime
GetTickCount
GetWindowsDirectoryA
OpenProcess
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
ExitProcess
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
BlockInput
GetSystemMetrics
SetRect
GetCursorInfo
GetCursorPos
ReleaseDC
GetDC
CreateWindowExA
LoadMenuA
RegisterClassA
LoadIconA
GetWindowThreadProcessId
IsWindow
CloseWindow
PostMessageA
DestroyCursor
LoadCursorA
UnhookWindowsHookEx
DispatchMessageA
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
EnumWindows
GetWindowTextA
GetClipboardData
TranslateMessage
GetMessageA
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
GetUserObjectInformationA
OpenInputDesktop
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
IsWindowVisible
BitBlt
DeleteDC
DeleteObject
GetDIBits
CreateCompatibleDC
CreateDIBSection
SelectObject
GetStockObject
CreateCompatibleBitmap
CreateDCA
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
SetServiceStatus
RegSaveKeyA
RegRestoreKeyA
RegisterServiceCtrlHandlerA
StartServiceA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegQueryValueA
SHGetFileInfoA
_strnicmp
_strrev
_strlwr
_strcmpi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
srand
_mbschr
_stricmp
wcstombs
rand
sprintf
_access
realloc
strncat
_errno
strncmp
atoi
strncpy
strrchr
_except_handler3
free
malloc
strchr
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
putchar
??2@YAPAXI@Z
??3@YAXPAX@Z
waveOutUnprepareHeader
waveOutClose
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutReset
recvfrom
sendto
WSAStartup
listen
accept
getpeername
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
closesocket
ntohs
recv
select
send
inet_ntoa
inet_addr
gethostname
getsockname
bind
__WSAFDIsSet
socket
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrame
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
GetModuleFileNameExA
WTSQueryUserToken
CreateEnvironmentBlock
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
MyNewFun
ftsWordBreak
wintest
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ