DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0bad6123c96d6a13f17c2dc07f6869d8314bb8cdedeebfef63c8f76b4eb70c63.dll
Resource
win7-20221111-en
Target
0bad6123c96d6a13f17c2dc07f6869d8314bb8cdedeebfef63c8f76b4eb70c63
Size
276KB
MD5
092d6d9c9370a6014d76af0ffa156d40
SHA1
03f4504cb7768b1bcf2fa43e7d2d92607909a707
SHA256
0bad6123c96d6a13f17c2dc07f6869d8314bb8cdedeebfef63c8f76b4eb70c63
SHA512
863874ef1cdec01ad8be638aac6913f89f05210dd08c94b826c89e0c61e3b777f76c5b059f68ef4576b7a10257fc774aa4cbfbf62c85c17f0e596357b704f882
SSDEEP
6144:G/Ux/fxOjHweIkvCVFiL3aSDCCmsoPwome24:kUpA00CzWt+Z9oe24
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
HeapDestroy
GetTickCount
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
SetEndOfFile
FlushFileBuffers
SetStdHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetCPInfo
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
lstrlenW
GetShortPathNameA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
WriteFile
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
TerminateProcess
ExitProcess
HeapAlloc
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
RaiseException
HeapFree
GetCommandLineA
RtlUnwind
SystemTimeToFileTime
QueryPerformanceCounter
ResetEvent
SetEvent
WaitForSingleObject
lstrcpynA
InitializeCriticalSection
DisableThreadLibraryCalls
lstrcmpiA
FreeLibrary
FindResourceA
LoadResource
LockResource
GetCurrentProcess
FlushInstructionCache
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
lstrcatA
LoadLibraryA
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GetEnvironmentVariableA
GlobalUnlock
WideCharToMultiByte
MultiByteToWideChar
SetLastError
lstrlenA
GetFileAttributesA
GetLastError
HeapCreate
CreateFileMappingA
MapViewOfFile
GetFileSize
UnmapViewOfFile
SearchPathA
VirtualProtect
VirtualQuery
ReadFile
GetVersionExA
CompareStringW
CompareStringA
CloseHandle
CreateEventA
QueryPerformanceFrequency
CreateFileA
LocalFree
FormatMessageA
Sleep
InterlockedExchange
GetCurrentProcessId
GetVersion
GetWindowsDirectoryA
GetLocalTime
FindClose
FindFirstFileA
wsprintfA
ScreenToClient
GetWindowRect
CopyRect
OffsetRect
DrawTextA
GetDlgCtrlID
GetDlgItemTextA
GetWindowDC
EnumChildWindows
IntersectRect
GetClassNameA
MessageBeep
BeginPaint
EndPaint
SendMessageA
UpdateWindow
GetWindow
SystemParametersInfoA
MapWindowPoints
CreateDialogIndirectParamA
GetWindowPlacement
ClientToScreen
SetFocus
SetDlgItemTextA
GetParent
InvalidateRect
DialogBoxParamA
GetSystemMenu
RemoveMenu
LoadStringA
AppendMenuA
GetClientRect
GetClassInfoExA
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
CallWindowProcA
DefWindowProcA
CreateWindowExA
LoadIconA
ShowWindow
SetWindowRgn
IsIconic
DestroyWindow
GetDesktopWindow
EnableWindow
SetCapture
LoadCursorA
SetCursor
ReleaseCapture
SetWindowTextA
IsWindow
GetDC
ReleaseDC
GetWindowLongA
SetWindowLongA
SetWindowPos
MoveWindow
GetDlgItem
GetSysColor
FillRect
CharLowerBuffA
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjects
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectA
BitBlt
DeleteDC
DeleteMetaFile
GetTextExtentPoint32A
GetStockObject
Rectangle
CreateRectRgn
GetDeviceCaps
CreateFontIndirectA
CreateSolidBrush
DeleteObject
SaveDC
SelectObject
SetBkMode
SetTextColor
TextOutA
RestoreDC
EnumFontFamiliesExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
StringFromCLSID
CoTaskMemFree
ProgIDFromCLSID
GetErrorInfo
CreateErrorInfo
SetErrorInfo
SysReAllocStringLen
SysStringLen
SysAllocStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
sndPlaySoundA
mciSendCommandA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE