DllCanUnloadNow
DllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
8d45b6e68d43d34a39452d8a4b6925ba97661dbe1c947e5b7f1b6e7dec39fa94.dll
Resource
win7-20220812-en
Target
8d45b6e68d43d34a39452d8a4b6925ba97661dbe1c947e5b7f1b6e7dec39fa94
Size
192KB
MD5
00019a566359f06b0a80687833397a40
SHA1
9b301721f99f9973839cc3f79fc5f7fc52b11bdd
SHA256
8d45b6e68d43d34a39452d8a4b6925ba97661dbe1c947e5b7f1b6e7dec39fa94
SHA512
2d71b46ae95bc1df5a53d8edc25913fd45332706c6dce4a386758943c01f09c842a4b1e946998e2d86036f13b2f1d92130ee09798eb4a509c874dc49373b0f8d
SSDEEP
3072:Cu6ocLGpmKqhzlhwtWHlO1YVXcJQxM1R+7YXN6AttRdbRPor80V6p:mLNhRhwtylO1YtcJL1sYpzPor8u6
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DestroyPropertySheetPage
CreatePropertySheetPageW
ord8
SetFileAttributesW
DeleteFileW
DeleteFileA
CreateDirectoryW
GetVersionExW
GetFullPathNameA
GetFullPathNameW
GetModuleFileNameA
GetModuleFileNameW
GetLocaleInfoW
GetNumberFormatW
GetDriveTypeW
ExpandEnvironmentStringsW
WaitForSingleObject
FindResourceW
LoadLibraryExW
CompareStringA
GetCurrentProcess
Sleep
SystemTimeToFileTime
FileTimeToSystemTime
WideCharToMultiByte
MultiByteToWideChar
CompareStringW
IsDBCSLeadByte
GetCPInfo
GetTempPathW
FlushFileBuffers
SetFileAttributesA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
HeapSize
InitializeCriticalSectionAndSpinCount
GetVersion
GetStartupInfoA
SetHandleCount
ExitProcess
GetModuleHandleA
HeapDestroy
HeapCreate
VirtualAlloc
GetFileAttributesW
GetFileAttributesA
GetModuleHandleW
WriteFile
SetLastError
SetFileTime
GetStdHandle
ReadFile
CreateFileW
CreateFileA
GetFileType
SetFilePointer
GetLastError
CloseHandle
FindFirstFileW
FindNextFileW
FindClose
LoadLibraryW
GetProcAddress
FreeLibrary
DosDateTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
VirtualFree
DeleteCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedDecrement
InterlockedIncrement
TlsFree
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
RaiseException
GetSystemTimeAsFileTime
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
OemToCharA
GetClassNameW
CharLowerW
CharToOemA
LoadStringW
GetWindowRect
SetWindowPos
GetWindowTextW
SetWindowTextW
GetSystemMetrics
GetWindow
CharUpperW
GetWindowLongW
SetWindowTextA
GetSysColor
LoadImageW
SendDlgItemMessageW
SetDlgItemTextW
SetWindowLongW
GetDlgItemTextW
GetClientRect
BeginPaint
EndPaint
CreatePopupMenu
InsertMenuItemW
GetParent
InvalidateRect
GetDC
SendMessageW
ReleaseDC
ShowWindow
GetDlgItem
GetObjectW
CreateCompatibleDC
GetPixel
SetPixel
DeleteDC
CreatePen
CreateSolidBrush
SetTextColor
TextOutW
Polygon
Polyline
DeleteObject
SelectObject
GetTextFaceW
GetTextMetricsW
CreateFontW
GetDeviceCaps
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
DragQueryFileW
ShellExecuteExW
SHGetPathFromIDListW
ReleaseStgMedium
DllCanUnloadNow
DllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE