CreateProcessNotify
GetPermLayers
GetDisplayName
DllClientCleanup
compator
DllClientStartup
Static task
static1
Behavioral task
behavioral1
Sample
ca4dd3b94e026bfaaca981fa8d46b37ad097762e0dc5f775e6ea8550fd688a6d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca4dd3b94e026bfaaca981fa8d46b37ad097762e0dc5f775e6ea8550fd688a6d.dll
Resource
win10v2004-20220812-en
Target
ca4dd3b94e026bfaaca981fa8d46b37ad097762e0dc5f775e6ea8550fd688a6d
Size
62KB
MD5
0f7a9e0c266fcdccddc8521c4ab208be
SHA1
8cb6b8280bde438e91838a0a9ad309c97e2a70ac
SHA256
ca4dd3b94e026bfaaca981fa8d46b37ad097762e0dc5f775e6ea8550fd688a6d
SHA512
7d967425d8ebe6a79fa388be8961b2500d112b7b877db6082b1bc593d3a416b15e4049dacf53b7a4e43ec35c727620c9b61187c1d5c65e67b2cf2cd79cc3d42a
SSDEEP
768:E0a90RBiiT2oUz5JWLj+hSixmuY/T93TvX38ZlhHDaG53mA2BkdEydv4bbB3BvQ6:s+R0i7qjDxid0ZlhriBU+bvPD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GlobalDeleteAtom
SetThreadAffinityMask
HeapFree
GlobalAddAtomA
VirtualQueryEx
UnmapViewOfFile
WaitForMultipleObjects
LocalFree
GetModuleHandleA
TerminateProcess
GetTimeZoneInformation
lstrlenW
GlobalUnlock
LoadLibraryW
CloseHandle
CreateDirectoryA
lstrcmpA
GetExitCodeProcess
ReadFile
GetComputerNameW
FindNextFileA
CreateFileMappingW
LoadLibraryExA
TerminateProcess
FreeResource
FileTimeToDosDateTime
lstrlenW
FindFirstFileA
MapViewOfFile
GetVolumeInformationA
GetThreadPriority
GetFileAttributesW
GetTempFileNameA
LeaveCriticalSection
SetEvent
IsValidCodePage
OpenClipboard
CharUpperW
SetWindowLongW
ShowOwnedPopups
GetPropA
ChildWindowFromPoint
GetWindowTextW
WinHelpA
CreateCaret
CharNextA
IsClipboardFormatAvailable
GetMessageTime
GetWindowDC
RegisterClassW
SetWindowPlacement
CharUpperA
EnumChildWindows
LoadKeyboardLayoutA
GetDoubleClickTime
MapVirtualKeyW
GetWindowTextLengthA
CreateIcon
WaitMessage
GetWindowLongW
SetRect
GetSubMenu
GetTopWindow
DrawEdge
GetWindowPlacement
TranslateMDISysAccel
SetTimer
DrawFocusRect
NotifyWinEvent
DefWindowProcA
GetMessageA
GetDlgItem
CharLowerA
GetActiveWindow
GetSystemMenu
SetMenu
GetKeyboardLayout
GetWindowThreadProcessId
OffsetRect
FrameRect
IsWindowUnicode
GetClassInfoW
GetCursor
DragAcceptFiles
DragQueryPoint
ShellExecuteExA
_FXbig
_Snan
_FDenorm
_Inf
_Wcrtomb
_Hugeval
_Strxfrm
_LSinh
_LDtest
_Getcvt
GetErrorInfo
VariantCopy
SafeArrayGetElement
ProgIDFromCLSID
StringFromCLSID
OleSetMenuDescriptor
ImmSetCompositionWindow
ImmReleaseContext
CreatePenIndirect
Ellipse
CombineRgn
CreateEnhMetaFileA
StretchBlt
SetPixelV
GetClipBox
SetRectRgn
SetBrushOrgEx
CloseEnhMetaFile
PlayEnhMetaFile
PatBlt
CreatePatternBrush
SetPaletteEntries
CreateSolidBrush
GetNearestPaletteIndex
SetViewportOrgEx
GetRandomRgn
PlaySoundA
ImageList_BeginDrag
ImageList_Replace
ImageList_Draw
InitCommonControls
ImageList_ReplaceIcon
ImageList_Remove
ImageList_GetDragImage
ImageList_DragShowNolock
ImageList_LoadImageA
InternetCombineUrlA
InternetConnectA
InternetErrorDlg
InternetOpenUrlA
InternetCrackUrlA
CoInternetCreateZoneManager
CreateProcessNotify
GetPermLayers
GetDisplayName
DllClientCleanup
compator
DllClientStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ