AsDecodedString
AsFile
BackslashReplaceErrors
Method_Function4
Number_Add
Occurred
TabError
get_x_offset_microns
set_PLTE
Static task
static1
Behavioral task
behavioral1
Sample
55f46f589732dbaee6415cbe98fa39c7a67a966f241f6f8f3b25fb568b62af97.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
55f46f589732dbaee6415cbe98fa39c7a67a966f241f6f8f3b25fb568b62af97.dll
Resource
win10v2004-20220812-en
Target
55f46f589732dbaee6415cbe98fa39c7a67a966f241f6f8f3b25fb568b62af97
Size
293KB
MD5
83496881023148e9d66d7ea463c65014
SHA1
0c385bed44cfc65565bf9fa3aa7684d60aa0d4f6
SHA256
55f46f589732dbaee6415cbe98fa39c7a67a966f241f6f8f3b25fb568b62af97
SHA512
eaeae9ff5cffa3ac5e315f6b33a579f69f284995f42c22e1eae97467a30944f00ccd2a9be47d892db3ac623ef61f34ed3063de9da351b5152c6b05af21623212
SSDEEP
6144:tGmkkgrEB2NSY15DERaSEZ4qeKn+IDaxoyvVsQ7:tGAPFcwI9Z4OvDa7
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InvalidateRect
IsChild
IsWindow
LoadCursorA
OffsetRect
PtInRect
RegisterClassExA
ReleaseDC
SetFocus
SetWindowLongA
SetWindowPos
SetWindowRgn
ShowWindow
UnionRect
UnregisterClassA
IntersectRect
GetWindowLongA
GetParent
GetKeyState
GetFocus
GetDC
GetClientRect
GetClassInfoExA
EqualRect
EndPaint
DestroyWindow
DefWindowProcA
CreateWindowExA
CharNextA
CallWindowProcA
BeginPaint
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCloseKey
VirtualAlloc
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
TerminateProcess
Sleep
VirtualFree
VirtualProtect
VirtualQuery
WideCharToMultiByte
lstrcmpiA
lstrlenA
lstrlenW
WriteFile
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindResourceA
FlushInstructionCache
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentStringsW
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetVersionExA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
SizeofResource
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadResource
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
RtlUnwind
SetHandleCount
SetLastError
HeapDestroy
VariantInit
VariantClear
VariantChangeType
SysStringLen
SysStringByteLen
SysFreeString
SysAllocStringLen
SysAllocStringByteLen
SysAllocString
SafeArrayUnaccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayAccessData
RegisterTypeLi
OleCreatePropertyFrame
LoadRegTypeLi
LoadTypeLi
GetDeviceCaps
DeleteMetaFile
DeleteDC
Rectangle
CreateMetaFileA
CreateCompatibleDC
CloseMetaFile
RestoreDC
SaveDC
SetTextAlign
SetWindowExtEx
SetWindowOrgEx
StretchBlt
TextOutA
CreateRectRgnIndirect
CoTaskMemAlloc
CoTaskMemFree
CreateOleAdviseHolder
OleSaveToStream
WriteClassStm
CoCreateInstance
AsDecodedString
AsFile
BackslashReplaceErrors
Method_Function4
Number_Add
Occurred
TabError
get_x_offset_microns
set_PLTE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ