DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b04741ce671b9824c31c41a8c27e247d21088c0aec65833114bca4e097ede436.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b04741ce671b9824c31c41a8c27e247d21088c0aec65833114bca4e097ede436.dll
Resource
win10v2004-20220812-en
Target
b04741ce671b9824c31c41a8c27e247d21088c0aec65833114bca4e097ede436
Size
248KB
MD5
7e086ca7adf5efe5585c9c8328dcae10
SHA1
0fc7472386a09ca59ff776e5302f066e524a8b38
SHA256
b04741ce671b9824c31c41a8c27e247d21088c0aec65833114bca4e097ede436
SHA512
bfde4db12f44a535e6d405197f38dde03463c82163e57979ee6dfce3727fa389cdc678fcbf496e6945441be9bdff3fcbdb40d5ec972e50997f914625e6328480
SSDEEP
3072:ZP5nNz7KXn8H2BkKczSyLCWzJCnTzXHwJjoc9Q82wc2untU6k+QmUb0rwn9COeXl:pNtKg2riSyV8nn3U9QXv2utk+EJ8dn
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
HeapDestroy
GetTickCount
GlobalUnlock
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
lstrlenW
GetEnvironmentStringsW
DeleteCriticalSection
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
ExitProcess
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
HeapAlloc
RaiseException
HeapFree
GetCommandLineA
RtlUnwind
ReadFile
GetShortPathNameA
InitializeCriticalSection
DisableThreadLibraryCalls
lstrcmpiA
FreeLibrary
FindResourceA
LoadResource
LockResource
GetCurrentProcess
FlushInstructionCache
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
lstrcatA
LoadLibraryA
GetProcAddress
GlobalFree
GlobalAlloc
GetEnvironmentStrings
GlobalLock
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetFileAttributesA
GetLastError
GetEnvironmentVariableA
SetLastError
TerminateProcess
WaitForSingleObject
SearchPathA
GetVersionExA
Sleep
InterlockedExchange
GetLocalTime
GetCurrentProcessId
GetVersion
GetWindowsDirectoryA
FormatMessageA
LocalFree
lstrcpynA
WriteFile
CreateFileA
SetFilePointer
CloseHandle
CompareStringA
CompareStringW
wsprintfA
CopyRect
OffsetRect
DrawTextA
GetDlgCtrlID
GetDlgItemTextA
GetWindowDC
EnumChildWindows
IntersectRect
GetClassNameA
MessageBeep
BeginPaint
EndPaint
SendMessageA
UpdateWindow
GetWindow
SystemParametersInfoA
MapWindowPoints
CreateDialogIndirectParamA
GetWindowPlacement
ClientToScreen
GetSystemMetrics
SetFocus
SetDlgItemTextA
GetParent
InvalidateRect
DialogBoxParamA
GetSystemMenu
RemoveMenu
LoadStringA
AppendMenuA
GetClientRect
GetClassInfoExA
RegisterClassExA
GetWindowTextLengthA
GetWindowTextA
CallWindowProcA
DefWindowProcA
CreateWindowExA
LoadIconA
ShowWindow
SetWindowRgn
IsIconic
DestroyWindow
GetDesktopWindow
EnableWindow
SetCapture
LoadCursorA
SetCursor
ReleaseCapture
SetWindowTextA
IsWindow
GetDC
ReleaseDC
GetWindowLongA
SetWindowLongA
SetWindowPos
MoveWindow
GetDlgItem
GetSysColor
FillRect
GetWindowRect
ScreenToClient
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectA
BitBlt
DeleteDC
DeleteMetaFile
GetTextExtentPoint32A
GetStockObject
Rectangle
CreateRectRgn
GetDeviceCaps
CreateFontIndirectA
CreateSolidBrush
DeleteObject
SaveDC
SelectObject
SetBkMode
SetTextColor
TextOutA
RestoreDC
EnumFontFamiliesExA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyA
StringFromCLSID
ProgIDFromCLSID
CoTaskMemFree
GetErrorInfo
CreateErrorInfo
SetErrorInfo
SysFreeString
SysReAllocStringLen
SysAllocString
LoadRegTypeLi
SysAllocStringLen
SysStringLen
mciSendCommandA
sndPlaySoundA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE