DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d233feee5a5e1a7ffadcf760ada6c861a19ce725da154750c895c457d9a3a45a.dll
Resource
win7-20220901-en
Target
d233feee5a5e1a7ffadcf760ada6c861a19ce725da154750c895c457d9a3a45a
Size
292KB
MD5
6fd5de6ab44e537f9cb712cd16256889
SHA1
ecd5abbb8985c121a32276b8fb7685744bc8860f
SHA256
d233feee5a5e1a7ffadcf760ada6c861a19ce725da154750c895c457d9a3a45a
SHA512
9ada357b9685766b1e39f26395b0db0ed570e6a9a8e96cf3d81443cfb0d2b68af5db55f2a8dcc77a536d6d2e6e139d8e21fe3771d3f32d60b81547dc994ed0fd
SSDEEP
6144:wzST+XLkJ0xTC0AfYOkhXHIm3nVMG7Vf4E+EEETBX:XJmmzfYOkoOGG7t+EEEV
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
UnregisterClassA
SetWindowLongA
GetWindowLongA
CreateWindowExA
DestroyWindow
ShowWindow
SendMessageA
DefWindowProcA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
RegisterClassExA
LoadCursorA
GetClassInfoExA
RegisterWindowMessageA
GetSysColor
SetTimer
KillTimer
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
GetActiveWindow
GetSystemMetrics
SetForegroundWindow
SetActiveWindow
wsprintfA
CreateAcceleratorTableA
IsWindow
GetDesktopWindow
SetFocus
GetFocus
GetWindow
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
FillRect
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
ClientToScreen
GetClientRect
SetWindowPos
MoveWindow
CharNextA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
SetHandleCount
GetFileType
SetStdHandle
GetCurrentDirectoryA
GetFullPathNameA
GetConsoleMode
GetConsoleCP
HeapSize
LCMapStringW
LCMapStringA
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
WriteFile
ExitProcess
HeapCreate
HeapDestroy
GetCommandLineA
SystemTimeToFileTime
LocalFileTimeToFileTime
InitializeCriticalSection
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
GetLastError
DeleteCriticalSection
lstrlenA
lstrcmpiA
InterlockedIncrement
GetTickCount
IsDBCSLeadByte
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
VirtualProtect
LockResource
DisableThreadLibraryCalls
SetThreadLocale
GetThreadLocale
GlobalUnlock
GlobalLock
GlobalAlloc
FlushInstructionCache
GetCurrentProcess
lstrcmpA
MulDiv
GetCurrentThreadId
SetLastError
CreateThread
Sleep
WaitForSingleObject
CloseHandle
CreateProcessA
GetTempPathA
GetProcAddress
ReadFile
SetFilePointer
CreateFileA
VirtualAlloc
VirtualFree
LoadLibraryA
IsBadReadPtr
HeapFree
GetProcessHeap
HeapAlloc
LocalFree
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetTimeZoneInformation
SetEndOfFile
CompareStringA
CompareStringW
InterlockedDecrement
SetFileTime
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
RtlUnwind
VirtualQuery
GetSystemInfo
HeapReAlloc
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InterlockedCompareExchange
GetVersionExA
GetLocaleInfoA
GetACP
InterlockedExchange
GetObjectA
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
GetStockObject
RegDeleteKeyA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
CoCreateInstance
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoInitialize
CoTaskMemAlloc
DispCallFunc
SysStringLen
LoadRegTypeLi
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
SysStringByteLen
OleCreateFontIndirect
VariantInit
VarUI4FromStr
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ