AdmClose
AdmFinished
AdmInit
AdmReset
AdmSaveData
CheckDuplicateKeys
CreateAdmUi
DllMain
GetAdmCategories
GetFontInfo
IsAdmDirty
ResetAdmDirtyFlag
Static task
static1
Behavioral task
behavioral1
Sample
9ca5b8a74d1c7d91bc1bea5a3189478e43a24bc630010c442d74e1102efb4795.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9ca5b8a74d1c7d91bc1bea5a3189478e43a24bc630010c442d74e1102efb4795.dll
Resource
win10v2004-20220901-en
Target
9ca5b8a74d1c7d91bc1bea5a3189478e43a24bc630010c442d74e1102efb4795
Size
71KB
MD5
283a08fee2e6098c31f6581922d89780
SHA1
e37be09e27272de7b4e52a44b8f7d0083238e8d6
SHA256
9ca5b8a74d1c7d91bc1bea5a3189478e43a24bc630010c442d74e1102efb4795
SHA512
064b931db36ea8c3909c61e473d766c6652e27b476bf740a7f775c2d014bca6f0c17e7c5ec0a5aa5fb4db86cdecb3ad098876d97915f3de12c0693d94da43d01
SSDEEP
1536:4mjj0KXCc2EmNUU6mIBRQ1eQkYC9+i11qGLi:J3qc2N16XB+1e5YCEiHV
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
bsearch
_wcsicmp
_wcsnicmp
wcsncmp
memcpy
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
??1type_info@@UAE@XZ
_amsg_exit
_initterm
free
malloc
_XcptFilter
_CxxThrowException
_vsnwprintf
MultiByteToWideChar
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
FreeLibrary
GetLocaleInfoW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
LoadResource
FindResourceExW
LocalReAlloc
GetPrivateProfileStringA
lstrlenA
GetLastError
WideCharToMultiByte
ReadFile
FormatMessageW
GetFileAttributesW
HeapFree
LocalFree
GetProcessHeap
CompareStringW
HeapReAlloc
HeapAlloc
lstrlenW
GetPrivateProfileStringW
CloseHandle
LocalAlloc
GetFileSize
CreateFileW
SetLastError
WritePrivateProfileSectionW
WritePrivateProfileStringW
lstrcmpW
GetPrivateProfileSectionW
GetModuleFileNameW
GetVersionExW
DeleteCriticalSection
DeleteAtom
FindAtomA
InitializeCriticalSection
DisableThreadLibraryCalls
LeaveCriticalSection
EnterCriticalSection
GlobalFree
GlobalAlloc
AddAtomA
WriteFile
SetFilePointer
lstrcmpiW
InterlockedDecrement
InterlockedExchange
Sleep
InterlockedCompareExchange
RtlUnwind
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DrawTextW
SetWindowPos
CreateWindowExW
GetScrollInfo
GetDC
ReleaseDC
GetParent
GetWindowRect
GetWindowTextW
DialogBoxParamW
CallWindowProcW
GetDlgItem
EnableWindow
GetDlgItemTextW
MessageBoxW
SetDlgItemTextW
EndDialog
SetWindowTextW
SendMessageW
MoveWindow
DestroyWindow
LoadCursorW
RegisterClassA
CreateWindowExA
GetWindowLongW
DefWindowProcW
SetScrollPos
SetWindowLongW
GetClientRect
LoadStringW
SetScrollRange
ShowWindow
UnregisterClassA
GetTextExtentPoint32W
SelectObject
DeleteObject
GetStockObject
GetTextMetricsW
CreateFontIndirectW
GetDeviceCaps
ord217
PathFindFileNameW
ord346
StrCmpW
StrRChrW
StrCSpnW
StrSpnW
StrCmpNW
StrDupW
StrToIntW
StrCmpIW
SysFreeString
VariantInit
VariantClear
SysStringLen
SysAllocString
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
ord16
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
ord113
ord112
AdmClose
AdmFinished
AdmInit
AdmReset
AdmSaveData
CheckDuplicateKeys
CreateAdmUi
DllMain
GetAdmCategories
GetFontInfo
IsAdmDirty
ResetAdmDirtyFlag
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ