DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
dfc6bbca7496c8b9c68b35578afff9305a7208f511389f292b567f3b39e20006.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfc6bbca7496c8b9c68b35578afff9305a7208f511389f292b567f3b39e20006.dll
Resource
win10v2004-20220812-en
Target
dfc6bbca7496c8b9c68b35578afff9305a7208f511389f292b567f3b39e20006
Size
756KB
MD5
ad3f17b50dde43eea6c158b09da1d420
SHA1
487aa85aa43c2994a0e55436ab738a3bef4a5405
SHA256
dfc6bbca7496c8b9c68b35578afff9305a7208f511389f292b567f3b39e20006
SHA512
4901ed2c098257c3ba9029186a80d9c928b9ec41f33541d1b197c89f4242c5221680b159c0d61efabc2bf05f3d911833a58b3b090a98184526804bc471f1db67
SSDEEP
12288:/XpT0aIm27OTlwXftRCqa+ZqACuFDVYp9SkMCljxqKbMRnyuAm4:/5NIh7OiXfxuACYVYp9SkMOxqCMRn+m
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
RpcStringFreeA
UuidCreate
UuidToStringA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
GetCurrentThread
GlobalAddAtomA
GetCurrentProcessId
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GlobalGetAtomNameA
WritePrivateProfileStringA
GlobalFlags
lstrcmpW
GlobalFindAtomA
SetEndOfFile
GetCurrentProcess
GetCPInfo
GetOEMCP
TerminateProcess
GetLocaleInfoA
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
HeapAlloc
HeapReAlloc
VirtualProtect
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
ExitThread
CreateThread
GetCommandLineA
GetProcessHeap
ExitProcess
HeapSize
GetStdHandle
GetACP
HeapDestroy
HeapCreate
Sleep
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
lstrcmpA
GlobalDeleteAtom
GetModuleFileNameW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
SetLastError
GetDiskFreeSpaceExW
GetDriveTypeW
GetDriveTypeA
GetThreadLocale
SetThreadLocale
GetModuleHandleA
LoadLibraryExA
IsDBCSLeadByte
RaiseException
FileTimeToLocalFileTime
FileTimeToSystemTime
FindResourceA
LoadResource
LockResource
SizeofResource
FlushFileBuffers
SetFilePointer
ReadFile
WriteFile
GetTimeZoneInformation
InterlockedDecrement
InterlockedIncrement
WaitForMultipleObjects
CreateSemaphoreA
CreateEventA
ReleaseSemaphore
SetEvent
ResetEvent
WaitForSingleObject
lstrcmpiA
CompareStringA
GetVersion
InterlockedExchange
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
VirtualAlloc
VirtualFree
GetSystemTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateDirectoryW
CreateDirectoryA
GetFileAttributesW
GetFileAttributesA
CreateFileW
CreateFileA
FindNextFileW
GetShortPathNameW
FindFirstFileW
FindFirstFileA
FindClose
GetFileSize
CloseHandle
GetLastError
GetVersionExA
GetModuleFileNameA
GetLocalTime
UnhandledExceptionFilter
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextA
TabbedTextOutA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
DestroyMenu
DefWindowProcA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
SendMessageA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CharNextA
wsprintfA
ShowWindow
DrawTextExA
GetSystemMetrics
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ExtTextOutA
TextOutA
RectVisible
PtVisible
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
GetClipBox
SetMapMode
SetTextColor
Escape
ClosePrinter
DocumentPropertiesA
OpenPrinterA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
SHFileOperationW
SHFileOperationA
PathFindFileNameA
PathFindExtensionA
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoUninitialize
StringFromGUID2
VariantChangeType
VariantClear
SysFreeString
VarUI4FromStr
SysStringLen
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VariantInit
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ