DllCanUnloadNow
DllGetClassObject
ExtAddNames
ExtGetCommandString
ExtInvokeCommand
ExtProcessDrop
ExtQueryContextMenu
ExtSetDestFolder
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
c14c8f4d9de885b333d19483bdef2dca129f710d89dbad4f183fcb17713eab80.dll
Resource
win7-20220812-en
Target
c14c8f4d9de885b333d19483bdef2dca129f710d89dbad4f183fcb17713eab80
Size
241KB
MD5
aa514fc887cb94a561c54f04348d50ae
SHA1
a9519dc4acd76f54a858cf23033ecee35a441cf7
SHA256
c14c8f4d9de885b333d19483bdef2dca129f710d89dbad4f183fcb17713eab80
SHA512
7a04427284d64ebb7978374697d28bc5133cd3927dddb89cc45cb1fb21b8752e5812c41af1409142cd92df176952ecff739c53c52835c74d0e372e1ffb31b786
SSDEEP
6144:fCa27A3XE2hmyqQ2WNpwPWYcZ+bvljHvJd:aaWu0WYcZq9PL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReleaseStgMedium
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
CloseHandle
CompareStringA
CreateDirectoryA
CreateFileA
CreateFileW
CreateProcessA
DeleteCriticalSection
DeleteFileA
DeleteFileW
DosDateTimeToFileTime
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStrings
GetFileAttributesA
GetFileAttributesW
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetNumberFormatA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
IsDBCSLeadByte
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LocalFileTimeToFileTime
MultiByteToWideChar
RaiseException
ReadFile
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
Sleep
SystemTimeToFileTime
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrcpynW
ord8
CreatePropertySheetPageA
DestroyPropertySheetPage
CreateCompatibleDC
CreateFontA
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
GetObjectA
GetPixel
GetTextFaceA
GetTextMetricsA
Polygon
Polyline
SelectObject
SetBkColor
SetPixel
SetTextColor
TextOutA
DragQueryFileA
DragQueryFileW
SHGetPathFromIDListA
BeginPaint
CharLowerA
CharLowerW
CharToOemA
CharUpperA
CharUpperW
CreatePopupMenu
EndPaint
EnumThreadWindows
GetClassNameA
GetClientRect
GetDC
GetDlgItem
GetDlgItemTextA
GetParent
GetSysColor
GetSystemMetrics
GetWindow
GetWindowLongA
GetWindowRect
GetWindowTextA
InsertMenuItemA
InvalidateRect
LoadImageA
LoadStringA
MessageBoxA
OemToCharA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
wsprintfA
DllCanUnloadNow
DllGetClassObject
ExtAddNames
ExtGetCommandString
ExtInvokeCommand
ExtProcessDrop
ExtQueryContextMenu
ExtSetDestFolder
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE