DllCanUnloadNow
DllGetClassObject
ExtAddNames
ExtGetCommandString
ExtInvokeCommand
ExtProcessDrop
ExtQueryContextMenu
ExtSetDestFolder
Static task
static1
Behavioral task
behavioral1
Sample
b1463312b169a26b939ee842b13a736a5a10171bd13b88a31f16115acd436d64.dll
Resource
win7-20220901-en
Target
b1463312b169a26b939ee842b13a736a5a10171bd13b88a31f16115acd436d64
Size
194KB
MD5
4800cfd015da96431167c43f5c4f82d0
SHA1
4290ef606c5c3787c028e06ddc0dfddd5501f8dd
SHA256
b1463312b169a26b939ee842b13a736a5a10171bd13b88a31f16115acd436d64
SHA512
b62b002e3e52232a4a9180f7da1d29b19e3fb36ed6e0194c4525838c301fa9a1b66709e4038697610418030d7a91355bf603d980cc669dcf49099f09eee02445
SSDEEP
6144:wgX0IIM/hTSyrzy4+BaOR/fS9JLmxUI12Aj3az1:RTN/hTleXSj+x2th
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DestroyPropertySheetPage
CreatePropertySheetPageA
ord8
GetFullPathNameA
GetFullPathNameW
DeleteFileA
DeleteFileW
CreateDirectoryA
GetVersionExA
GetModuleFileNameA
GetLocaleInfoA
GetNumberFormatA
WideCharToMultiByte
ExpandEnvironmentStringsA
WaitForSingleObject
lstrcpynW
lstrcpynA
FindResourceA
LoadLibraryExA
CompareStringA
GetCurrentProcess
Sleep
SystemTimeToFileTime
MultiByteToWideChar
IsDBCSLeadByte
GetCPInfo
GetTempPathA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
HeapSize
InitializeCriticalSectionAndSpinCount
GetVersion
GetStartupInfoA
SetHandleCount
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
ExitProcess
HeapDestroy
HeapCreate
VirtualAlloc
VirtualFree
DeleteCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedDecrement
GetFileAttributesW
GetFileAttributesA
GetModuleHandleA
GetDriveTypeA
WriteFile
SetLastError
GetStdHandle
ReadFile
CreateFileW
CreateFileA
GetFileType
SetEndOfFile
SetFilePointer
GetProcessHeap
GetLastError
CloseHandle
FindFirstFileA
FindNextFileA
FindClose
LoadLibraryA
GetProcAddress
FreeLibrary
DosDateTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
GetCommandLineA
GetCurrentThreadId
LeaveCriticalSection
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
RaiseException
GetSystemTimeAsFileTime
SetStdHandle
EnterCriticalSection
OemToCharA
CharUpperW
CharLowerW
CharLowerA
LoadStringA
GetWindowRect
SetWindowPos
GetWindowTextA
GetSystemMetrics
GetWindow
GetClassNameA
CharToOemA
GetWindowLongA
SetWindowTextA
wsprintfW
LoadImageA
SendDlgItemMessageA
CharUpperA
SetDlgItemTextA
wsprintfA
SetWindowLongA
GetDlgItemTextA
GetClientRect
BeginPaint
EndPaint
CreatePopupMenu
InsertMenuItemA
InsertMenuItemW
GetSysColor
GetParent
InvalidateRect
GetDC
SendMessageA
ReleaseDC
ShowWindow
GetDlgItem
CreateCompatibleDC
GetPixel
SetPixel
DeleteDC
TextOutA
CreatePen
CreateSolidBrush
SetTextColor
SetBkColor
Polygon
Polyline
DeleteObject
SelectObject
GetTextFaceA
GetTextMetricsA
CreateFontA
GetObjectA
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegSetValueExA
RegCreateKeyExA
RegCloseKey
DragQueryFileA
ShellExecuteExA
SHGetPathFromIDListA
DragQueryFileW
ReleaseStgMedium
DllCanUnloadNow
DllGetClassObject
ExtAddNames
ExtGetCommandString
ExtInvokeCommand
ExtProcessDrop
ExtQueryContextMenu
ExtSetDestFolder
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE