DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b0513d0a040e56d3c8896e8ba57b0db18571bcf743ed931004fb4804163992ad.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0513d0a040e56d3c8896e8ba57b0db18571bcf743ed931004fb4804163992ad.dll
Resource
win10v2004-20220812-en
Target
b0513d0a040e56d3c8896e8ba57b0db18571bcf743ed931004fb4804163992ad
Size
352KB
MD5
96f8fb093ccb2c806097c001e03a97e6
SHA1
27c76eb1a2f44f014460b371be1cbc7082f7549b
SHA256
b0513d0a040e56d3c8896e8ba57b0db18571bcf743ed931004fb4804163992ad
SHA512
3920342cb89a822cb3026d448b2426f08766ef64a85c7c6e00f7f5f3df2517948f68709bb620c3c9c5753f8d76f41649c11bb0b258fa011df2b7dce092a3b4f3
SSDEEP
6144:18kkTeBgJ77+0NNeYIJM1/9p3miMIUq4VVnlHicTMx2EPBCP:1aTOO7+0xhmiMtqCVlr+JCP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
AccessibleObjectFromPoint
MapViewOfFile
CreateFileMappingW
lstrcmpiW
CompareStringW
GetCurrentProcessId
CreateEventW
OutputDebugStringW
GetCurrentThreadId
WaitForSingleObject
FlushInstructionCache
GetCurrentProcess
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
DisableThreadLibraryCalls
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
lstrlenW
LocalFree
GetSystemTimeAsFileTime
QueryPerformanceCounter
ExitProcess
HeapSize
HeapReAlloc
HeapDestroy
RaiseException
GetVersionExA
LockResource
UnmapViewOfFile
LoadResource
FindResourceW
FindResourceExW
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExW
MultiByteToWideChar
HeapFree
GetProcessHeap
SizeofResource
FreeLibrary
GetProcAddress
LoadLibraryW
lstrlenA
CloseHandle
SetLastError
GlobalUnlock
GetTickCount
GlobalLock
GlobalAlloc
GetLastError
EnumThreadWindows
IsWindow
EqualRect
IsRectEmpty
OffsetRect
RegisterWindowMessageW
GetCursorPos
WindowFromPoint
GetClassNameW
wvsprintfW
GetWindow
MapDialogRect
SetWindowContextHelpId
SetWindowLongW
DestroyWindow
IsZoomed
GetWindowThreadProcessId
SetWinEventHook
UnhookWinEvent
SetForegroundWindow
SetWindowPos
MessageBoxW
SendDlgItemMessageW
KillTimer
SetTimer
SendMessageW
EndDialog
GetAncestor
FindWindowW
GetWindowRect
GetFocus
SetFocus
PostMessageW
CreateWindowExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryValueExW
RegOpenKeyExW
InitializeSecurityDescriptor
RegDeleteKeyW
RegCloseKey
SHGetSpecialFolderPathW
CreateStreamOnHGlobal
CoCreateInstance
LoadTypeLi
LoadRegTypeLi
VariantCopy
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VariantClear
SysStringLen
SysAllocStringLen
SysFreeString
VariantInit
GetErrorInfo
ord65
ord66
ord37
ord18
ord22
ord64
ord42
ord49
ord23
ord61
ord15
ord58
ord60
ord48
ord31
ord30
ord43
ord32
ord44
wcscmp
memmove
memcpy
__CxxFrameHandler
swprintf
??_V@YAXPAX@Z
malloc
_purecall
wcscat
_CxxThrowException
??3@YAXPAX@Z
free
memset
wcsncpy
labs
memcmp
_except_handler3
_wcslwr
??2@YAPAXI@Z
??_U@YAPAXI@Z
__dllonexit
_onexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_initterm
_adjust_fdiv
__CppXcptFilter
wcsstr
__security_error_handler
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE