DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bce932f73fbb4a6677c50769bcc9a6b91ff6d32989a513da7c7a2199c3f2fc0a.dll
Resource
win7-20220812-en
Target
bce932f73fbb4a6677c50769bcc9a6b91ff6d32989a513da7c7a2199c3f2fc0a
Size
360KB
MD5
b21367fbf34ad09efe4f69f83e7f771c
SHA1
834427d32df0f600945f92efb1b293060613c42e
SHA256
bce932f73fbb4a6677c50769bcc9a6b91ff6d32989a513da7c7a2199c3f2fc0a
SHA512
1ebeaa883f85906fa8a4348480bb8d2844159f864a37503f7d0768ed0be398cd560b400d14f571fc803fae31c084b55260801b9b6237725de2903031d8238ab3
SSDEEP
6144:lzFn4ut3Oy+2xjXfI8wurnB6g4rRGMBDtC4qDEYC7ME6:lzFnj3Q21wILBYRGR4qgb7f6
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapDestroy
GetTickCount
GlobalUnlock
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
lstrlenW
GetEnvironmentStringsW
DeleteCriticalSection
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
ExitProcess
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
HeapAlloc
RaiseException
HeapFree
GetCommandLineA
RtlUnwind
ReadFile
GetShortPathNameA
InitializeCriticalSection
DisableThreadLibraryCalls
lstrcmpiA
FreeLibrary
FindResourceA
LoadResource
LockResource
GetCurrentProcess
FlushInstructionCache
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
lstrcatA
LoadLibraryA
GetProcAddress
GlobalFree
GlobalAlloc
GetEnvironmentStrings
GlobalLock
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetFileAttributesA
GetLastError
GetEnvironmentVariableA
SetLastError
TerminateProcess
WaitForSingleObject
SearchPathA
GetVersionExA
Sleep
InterlockedExchange
GetLocalTime
GetCurrentProcessId
GetVersion
FormatMessageA
LocalFree
GetWindowsDirectoryA
lstrcpynA
WriteFile
CreateFileA
SetFilePointer
CloseHandle
CompareStringA
CompareStringW
wsprintfA
CopyRect
OffsetRect
DrawTextA
GetDlgCtrlID
GetDlgItemTextA
GetWindowDC
EnumChildWindows
IntersectRect
GetClassNameA
MessageBeep
BeginPaint
EndPaint
SendMessageA
UpdateWindow
GetWindow
SystemParametersInfoA
MapWindowPoints
CreateDialogIndirectParamA
GetWindowPlacement
ClientToScreen
GetSystemMetrics
SetFocus
SetDlgItemTextA
GetParent
InvalidateRect
DialogBoxParamA
GetSystemMenu
RemoveMenu
LoadStringA
AppendMenuA
GetClientRect
GetClassInfoExA
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
CallWindowProcA
DefWindowProcA
CreateWindowExA
LoadIconA
ShowWindow
SetWindowRgn
IsIconic
DestroyWindow
GetDesktopWindow
EnableWindow
SetCapture
LoadCursorA
SetCursor
ReleaseCapture
SetWindowTextA
IsWindow
GetDC
ReleaseDC
GetWindowLongA
SetWindowLongA
SetWindowPos
MoveWindow
GetDlgItem
GetSysColor
FillRect
GetWindowRect
ScreenToClient
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectA
BitBlt
DeleteDC
DeleteMetaFile
GetTextExtentPoint32A
GetStockObject
Rectangle
CreateRectRgn
GetDeviceCaps
CreateFontIndirectA
CreateSolidBrush
DeleteObject
SaveDC
SelectObject
SetBkMode
SetTextColor
TextOutA
RestoreDC
EnumFontFamiliesExA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyA
StringFromCLSID
ProgIDFromCLSID
CoTaskMemFree
GetErrorInfo
CreateErrorInfo
SetErrorInfo
SysFreeString
SysReAllocStringLen
SysAllocString
LoadRegTypeLi
SysAllocStringLen
SysStringLen
mciSendCommandA
sndPlaySoundA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE