DllCanUnloadNow
DllGetClassObject
DllRegisterServer
GetNewInf
Static task
static1
Behavioral task
behavioral1
Sample
3837ffea68552bc08a5cc04135cfa8b67a980e8202bfcb5fef3938ae7f25bb2f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3837ffea68552bc08a5cc04135cfa8b67a980e8202bfcb5fef3938ae7f25bb2f.dll
Resource
win10v2004-20220901-en
Target
3837ffea68552bc08a5cc04135cfa8b67a980e8202bfcb5fef3938ae7f25bb2f
Size
220KB
MD5
9bcb87093ea05c040ea338051d8554e0
SHA1
147fb205c1afec415020ba82fccfbd662b181991
SHA256
3837ffea68552bc08a5cc04135cfa8b67a980e8202bfcb5fef3938ae7f25bb2f
SHA512
69f4026ec0cd5f7a595ca9341cfcab79cfb535235fd8865b6ce2003c66cd234737a9324cb7b5dd6679d839a3c11015c193726599b9f00c7aac102b0c5f4d42eb
SSDEEP
3072:T16gNuv54YiO6AnEjSlXgkYo3UqSWt0uitNowFUTTOO/MvHeFjV+:ZYiO6AnBYjETTJEv+F
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RtlUnwind
GetCommandLineA
RaiseException
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
HeapSize
HeapReAlloc
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcess
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
FormatMessageA
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
CloseHandle
GetModuleFileNameA
GlobalAlloc
lstrcmpA
GetCurrentThread
lstrcpynA
GetLastError
SetLastError
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GetProcAddress
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
GlobalLock
GlobalUnlock
lstrlenA
GetEnvironmentStrings
MultiByteToWideChar
LoadCursorA
GetSysColorBrush
DestroyMenu
UnregisterClassA
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
GetCursorPos
SetCursor
PostQuitMessage
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
IsWindowEnabled
ShowWindow
SetWindowTextA
LoadIconA
PostMessageA
MapWindowPoints
GetSysColor
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxA
GetParent
GetCapture
WinHelpA
FillRect
GetClientRect
LoadBitmapA
EnableWindow
IsWindow
GetWindowTextA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetDlgCtrlID
GetKeyState
DefWindowProcA
PtInRect
GetClassNameA
LoadStringA
DestroyWindow
CreateWindowExA
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
GetWindowLongA
GetWindow
SendMessageA
SetForegroundWindow
GetForegroundWindow
GetLastActivePopup
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
PeekMessageA
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DeleteObject
BitBlt
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleDC
GetObjectA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
ord17
CoCreateInstance
OleRun
CLSIDFromString
CLSIDFromProgID
VariantCopyInd
VariantClear
VariantChangeType
SysFreeString
SysAllocString
VariantCopy
SysStringLen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
GetNewInf
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ