DllMain
HDAudDlgProc
HDAudPropPageProvider
Static task
static1
Behavioral task
behavioral1
Sample
3aa68093f3c7ac812d763fd2b036912ebf4f40d170765a3b8be886a727c2202c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3aa68093f3c7ac812d763fd2b036912ebf4f40d170765a3b8be886a727c2202c.dll
Resource
win10v2004-20220812-en
Target
3aa68093f3c7ac812d763fd2b036912ebf4f40d170765a3b8be886a727c2202c
Size
83KB
MD5
f5cfdb4d4435b9f004c2a123896725cc
SHA1
70541b6043c6c8503ecfde783a3f8b72fc8dfaad
SHA256
3aa68093f3c7ac812d763fd2b036912ebf4f40d170765a3b8be886a727c2202c
SHA512
f9f03ee73ff4770af30689090ea7252946c9a16115d77fb550b0b5509fdf0f4907bc93ae41bd7f081b0e266f1486a00f1fcaa052bc15c40d5738aaf257e4adee
SSDEEP
1536:vyVcnChTAZ8/k8xByDzda3V5+9ue1BXFBiX8bxJ5DHT2J7PJoWO65rvO/ys:UcKTAm/5xBSAv+9ue/XFBWoJ5DT2hc6L
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
LocalFree
LocalAlloc
GetLastError
FindClose
FindFirstFileW
GetSystemDirectoryW
CreateProcessW
LoadLibraryW
CreateFileW
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
DeviceIoControl
CloseHandle
OutputDebugStringW
FindResourceW
LoadResource
GetProcAddress
LockResource
_vsnwprintf
SetupDiSetClassInstallParamsW
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
SetupDiGetDeviceInstanceIdW
SetupDiCreateDeviceInfoList
SetupDiOpenDeviceInfoW
SetupDiDestroyDeviceInfoList
SetupDiOpenDevRegKey
SetupDiChangeState
RegSetValueExW
RegQueryValueExW
RegCloseKey
CreatePropertySheetPageW
DestroyPropertySheetPage
DialogBoxIndirectParamW
EndDialog
SendMessageW
GetDlgItem
GetWindowLongW
MessageBoxW
LoadStringW
CheckDlgButton
EnableWindow
SetWindowTextW
GetParent
IsWindowEnabled
SetWindowLongW
SetCursor
LoadCursorW
CheckRadioButton
IsDlgButtonChecked
DllMain
HDAudDlgProc
HDAudPropPageProvider
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ