DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d69e3af8fbe65440bd018b229ae943313b7d947d9e61e0d28ca773e531bda032.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d69e3af8fbe65440bd018b229ae943313b7d947d9e61e0d28ca773e531bda032.dll
Resource
win10v2004-20221111-en
Target
d69e3af8fbe65440bd018b229ae943313b7d947d9e61e0d28ca773e531bda032
Size
344KB
MD5
3120d27c035ec78e7022e02d2bf38780
SHA1
6e91761b3377adaf5d2719b1e25e4de1e997d224
SHA256
d69e3af8fbe65440bd018b229ae943313b7d947d9e61e0d28ca773e531bda032
SHA512
962506787061f1f1f289098bef4c4f517cb51e43b47184534e906a9d3f0e118dedbf3ca66c7da6e08bf92821d0b67e1229a070f45068bf21bb55ab0e634be623
SSDEEP
6144:uCFU39TsIC30JmJW6wIO22vP4dFhOlJPE/97xR59Q1jvk6SxLbavCQy5wa:JFUtJ3iW6wIO22vP4dFhOlJPi97xR59n
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpA
Sleep
lstrcpyA
lstrcatA
WriteFile
CreateFileA
CloseHandle
GetTickCount
ReadFile
GetFileSize
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
lstrcmpiA
GetModuleHandleA
lstrcpynA
IsDBCSLeadByte
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
MulDiv
SetFilePointer
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
FlushFileBuffers
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
IsBadWritePtr
VirtualFree
HeapCreate
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
SetUnhandledExceptionFilter
GetCurrentProcessId
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
GetProcAddress
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
ExitProcess
GetFullPathNameA
HeapSize
HeapReAlloc
HeapDestroy
lstrlenW
GetModuleFileNameA
GlobalAlloc
GlobalLock
GlobalUnlock
GetCurrentThreadId
WideCharToMultiByte
InterlockedExchange
lstrlenA
InterlockedDecrement
InterlockedIncrement
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLastError
RaiseException
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetStringTypeA
UnregisterClassA
wsprintfA
GetClassInfoExA
SetActiveWindow
ShowWindow
MoveWindow
DestroyWindow
GetWindowLongA
SetWindowLongA
IsWindowUnicode
SendMessageTimeoutW
SendMessageA
InflateRect
OffsetRect
LoadCursorA
IsWindow
MessageBoxA
SetRectEmpty
PtInRect
ClientToScreen
SetRect
ClipCursor
SetScrollInfo
SetScrollRange
EnableScrollBar
SetScrollPos
LockWindowUpdate
MessageBoxW
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
SetWindowPos
RedrawWindow
GetDlgItem
SetFocus
GetFocus
IsChild
GetWindow
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
GetDesktopWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
GetClientRect
FillRect
SetCapture
ReleaseCapture
GetSysColor
CreateWindowExA
PostMessageA
RegisterWindowMessageA
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
DefWindowProcA
CreatePen
ExtCreatePen
SetWindowOrgEx
CreateSolidBrush
GetStockObject
Polyline
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
GetDIBits
LineTo
MoveToEx
Rectangle
StretchDIBits
GetObjectA
DeleteObject
RegDeleteKeyA
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
SHGetFileInfoA
CreateStreamOnHGlobal
StringFromCLSID
CoTaskMemFree
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
OleUninitialize
OleInitialize
SysStringByteLen
SysAllocStringLen
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
SysFreeString
SysStringLen
OleCreateFontIndirect
SysAllocString
LoadTypeLi
LoadRegTypeLi
VariantInit
DispCallFunc
VariantClear
PathFileExistsA
PathFindExtensionA
_GetSCSEngine@0
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE