DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
495d3b066594b603818da54b9a4e64912554c304c6048a66d9dac7b02d6599cd.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
495d3b066594b603818da54b9a4e64912554c304c6048a66d9dac7b02d6599cd.dll
Resource
win10v2004-20220812-en
Target
495d3b066594b603818da54b9a4e64912554c304c6048a66d9dac7b02d6599cd
Size
336KB
MD5
055ac07b6b2d59f8644739f013b9e9c0
SHA1
4d21deeea6785946d8a5329cc90e9c143423cdff
SHA256
495d3b066594b603818da54b9a4e64912554c304c6048a66d9dac7b02d6599cd
SHA512
266946485446779069ff76ea38555dbd4c5c7d1e80383c60aa9615bc523b9f0272ac1a1845f32be7303dc9de3a99abc34d621918b6d712fa03d3a401fdbae63c
SSDEEP
6144:mU/POVKftTih1RXEEMq1/Xna0b7jr0dmYfB:mUHOVKMNE1q1/bvj5w
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegQueryValueExA
timeGetTime
GetFileAttributesA
GetFileSize
GetFileTime
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
HeapFree
HeapReAlloc
HeapAlloc
RaiseException
GetCommandLineA
ExitProcess
TerminateProcess
HeapSize
GetACP
GetTimeZoneInformation
GetEnvironmentVariableA
GetVersionExA
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetProcessVersion
SetUnhandledExceptionFilter
GlobalFree
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
lstrlenA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
SetLastError
GlobalFlags
GetVersion
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
TlsAlloc
LocalAlloc
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
LocalFree
InitializeCriticalSection
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
GetPrivateProfileStringA
WritePrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetPrivateProfileSectionA
WritePrivateProfileStringA
GetLocalTime
Sleep
CreateThread
CreateProcessA
WaitForSingleObject
CloseHandle
OpenProcess
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
GetProcAddress
lstrcatA
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
LCMapStringA
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
DestroyMenu
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
GetMenu
TabbedTextOutA
GetMenuItemCount
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
UnregisterClassA
GetSystemMetrics
CharUpperA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
EnableWindow
SetCursor
SendMessageA
PostMessageA
EndDialog
DialogBoxParamA
MessageBoxA
CreateDialogParamA
SetWindowTextA
GetMessageA
IsDialogMessageA
CharNextA
ReleaseDC
GetDC
DestroyWindow
IsChild
GetFocus
TranslateMessage
GetSubMenu
DrawTextA
GetMenuItemID
DispatchMessageA
GetDlgItem
EndPaint
GetClientRect
BeginPaint
IsWindow
InvalidateRect
GetKeyState
PtInRect
UnionRect
SetWindowPos
SetWindowRgn
OffsetRect
EqualRect
IntersectRect
RegisterClassExA
GetWindowTextA
PostQuitMessage
KillTimer
CallWindowProcA
CreateWindowExA
GetWindowLongA
SetWindowLongA
GetParent
ShowWindow
SetFocus
DefWindowProcA
GetClassInfoExA
LoadCursorA
wsprintfA
GetActiveWindow
SetMapMode
SaveDC
LPtoDP
GetDeviceCaps
CreateDCA
TextOutA
SetTextAlign
Rectangle
CreateRectRgnIndirect
DeleteMetaFile
CloseMetaFile
SetWindowExtEx
CreateMetaFileA
CreateBitmap
DeleteObject
SelectObject
GetStockObject
SetBkColor
SetTextColor
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
GetClipBox
PtVisible
RectVisible
ExtTextOutA
Escape
GetObjectA
SetViewportOrgEx
DeleteDC
ScaleWindowExtEx
RestoreDC
GetFileTitleA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ord17
OleRegEnumVerbs
CoCreateInstance
OleRegGetUserType
CoTaskMemAlloc
CoTaskMemFree
CreateOleAdviseHolder
OleRegGetMiscStatus
CreateDataAdviseHolder
OleLoadFromStream
OleSaveToStream
WriteClassStm
CoTaskMemRealloc
ord250
SysAllocStringLen
SysFreeString
VarUI4FromStr
RegisterTypeLi
LoadTypeLi
SysAllocString
LoadRegTypeLi
SysStringLen
VariantClear
SysAllocStringByteLen
VariantChangeType
SysStringByteLen
ord5
ord9
ord20
ord6
ord8
ord7
ord3
ord14
ord13
ord15
ord16
ord17
ord18
ord4
ord19
ord10
ord2
EnumProcessModules
EnumProcesses
GetModuleFileNameExA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE