DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8ebceab832938cca4345c0430c2b028a7e7fe49e9c42e1a03990dd676dbef812.dll
Resource
win7-20221111-en
Target
8ebceab832938cca4345c0430c2b028a7e7fe49e9c42e1a03990dd676dbef812
Size
292KB
MD5
16cbbc3f82e22c6c996b6083eeb9d67d
SHA1
5054676cb732a4b93758290300e6cb5888c1896e
SHA256
8ebceab832938cca4345c0430c2b028a7e7fe49e9c42e1a03990dd676dbef812
SHA512
a86464a8783dd2d48bf2b9651dd435b03afcea65add9d13c22ca70c0f12a44d39c91b9b4499d9959f4a8760ce05f4aa8d08dab59be4203533624a4940adaa09f
SSDEEP
6144:wzST+XLkJ0xTC0AfYOkhXHIm3nVMG7Vf4E+EEETBq:XJmmzfYOkoOGG7t+EEEM
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
UnregisterClassA
SetWindowLongA
GetWindowLongA
CreateWindowExA
DestroyWindow
ShowWindow
SendMessageA
DefWindowProcA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
RegisterClassExA
LoadCursorA
GetClassInfoExA
RegisterWindowMessageA
GetSysColor
SetTimer
KillTimer
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
GetActiveWindow
GetSystemMetrics
SetForegroundWindow
SetActiveWindow
wsprintfA
CreateAcceleratorTableA
IsWindow
GetDesktopWindow
SetFocus
GetFocus
GetWindow
DestroyAcceleratorTable
BeginPaint
EndPaint
CallWindowProcA
FillRect
ReleaseCapture
GetClassNameA
GetDlgItem
GetParent
IsChild
SetCapture
RedrawWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
ScreenToClient
ClientToScreen
GetClientRect
SetWindowPos
MoveWindow
CharNextA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
SetHandleCount
GetFileType
SetStdHandle
GetCurrentDirectoryA
GetFullPathNameA
GetConsoleMode
GetConsoleCP
HeapSize
LCMapStringW
LCMapStringA
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
WriteFile
ExitProcess
HeapCreate
HeapDestroy
GetCommandLineA
SystemTimeToFileTime
LocalFileTimeToFileTime
InitializeCriticalSection
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
GetLastError
DeleteCriticalSection
lstrlenA
lstrcmpiA
InterlockedIncrement
GetTickCount
IsDBCSLeadByte
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
VirtualProtect
LockResource
DisableThreadLibraryCalls
SetThreadLocale
GetThreadLocale
GlobalUnlock
GlobalLock
GlobalAlloc
FlushInstructionCache
GetCurrentProcess
lstrcmpA
MulDiv
GetCurrentThreadId
SetLastError
CreateThread
Sleep
WaitForSingleObject
CloseHandle
CreateProcessA
GetTempPathA
GetProcAddress
ReadFile
SetFilePointer
CreateFileA
VirtualAlloc
VirtualFree
LoadLibraryA
IsBadReadPtr
HeapFree
GetProcessHeap
HeapAlloc
LocalFree
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetTimeZoneInformation
SetEndOfFile
CompareStringA
CompareStringW
InterlockedDecrement
SetFileTime
FindFirstFileA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
RtlUnwind
VirtualQuery
GetSystemInfo
HeapReAlloc
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InterlockedCompareExchange
GetVersionExA
GetLocaleInfoA
GetACP
InterlockedExchange
GetObjectA
CreateSolidBrush
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
GetStockObject
RegDeleteKeyA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
CoTaskMemRealloc
CoTaskMemFree
StringFromGUID2
CoCreateInstance
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoInitialize
CoTaskMemAlloc
DispCallFunc
SysStringLen
LoadRegTypeLi
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
SysStringByteLen
OleCreateFontIndirect
VariantInit
VarUI4FromStr
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ