OLS807_Bosch_MED17.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: 49f29f5190312e1276c049631c6c135c

File Size: 2.3 MB

Uploaded At: March 10, 2026, 7:24 p.m.

Views: 14

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory

Exported Functions

  • ?DllInit@@YA_NPAVCChecksumInterface@@K@Z (Ordinal: 1, Address: 0x5780)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x1052de1c)
GDI32.dll
  • BitBlt (Address: 0x103af00c)
  • CreateCompatibleDC (Address: 0x103af004)
  • CreateDCA (Address: 0x103af018)
  • CreateDIBitmap (Address: 0x103af024)
  • CreatePalette (Address: 0x103af014)
  • DeleteDC (Address: 0x103af020)
  • DeleteObject (Address: 0x103af010)
  • RealizePalette (Address: 0x103af000)
  • SelectObject (Address: 0x103af008)
  • SelectPalette (Address: 0x103af01c)
gdiplus.dll
  • GdipDeleteGraphics (Address: 0x1052ddfc)
IMM32.dll
  • ImmGetContext (Address: 0x1052de04)
KERNEL32.dll
  • CloseHandle (Address: 0x103af0a4)
  • ContinueDebugEvent (Address: 0x103af0d8)
  • CreateFileA (Address: 0x103af0b8)
  • CreateFileMappingA (Address: 0x103af10c)
  • CreateMutexA (Address: 0x103af144)
  • CreateProcessA (Address: 0x103af090)
  • CreateProcessW (Address: 0x103af0f4)
  • CreateThread (Address: 0x103af02c)
  • DebugActiveProcess (Address: 0x103af0ec)
  • DuplicateHandle (Address: 0x103af104)
  • EnterCriticalSection (Address: 0x103af124)
  • ExitProcess (Address: 0x103af118)
  • FindClose (Address: 0x103af0bc)
  • FindFirstFileA (Address: 0x103af0c0)
  • FindFirstFileW (Address: 0x103af0c4)
  • FreeConsole (Address: 0x103af06c)
  • GetCommandLineA (Address: 0x103af094)
  • GetCommandLineW (Address: 0x103af0f8)
  • GetCurrentProcess (Address: 0x103af108)
  • GetCurrentProcessId (Address: 0x103af134)
  • GetCurrentThread (Address: 0x103af08c)
  • GetCurrentThreadId (Address: 0x103af0ac)
  • GetEnvironmentVariableA (Address: 0x103af068)
  • GetExitCodeProcess (Address: 0x103af0cc)
  • GetFileSize (Address: 0x103af0b4)
  • GetLastError (Address: 0x103af07c)
  • GetLocalTime (Address: 0x103af11c)
  • GetModuleFileNameA (Address: 0x103af140)
  • GetModuleFileNameW (Address: 0x103af138)
  • GetModuleHandleA (Address: 0x103af050)
  • GetProcAddress (Address: 0x103af078)
  • GetShortPathNameA (Address: 0x103af148)
  • GetShortPathNameW (Address: 0x103af13c)
  • GetStartupInfoA (Address: 0x103af098)
  • GetStartupInfoW (Address: 0x103af0fc)
  • GetThreadContext (Address: 0x103af0e0)
  • GetTickCount (Address: 0x103af03c)
  • GetVersionExA (Address: 0x103af12c)
  • GlobalAddAtomA (Address: 0x103af048)
  • GlobalAddAtomW (Address: 0x103af04c)
  • GlobalAlloc (Address: 0x103af038)
  • GlobalDeleteAtom (Address: 0x103af05c)
  • GlobalFree (Address: 0x103af054)
  • GlobalGetAtomNameA (Address: 0x103af058)
  • GlobalGetAtomNameW (Address: 0x103af060)
  • GlobalLock (Address: 0x103af034)
  • GlobalUnlock (Address: 0x103af030)
  • InitializeCriticalSection (Address: 0x103af130)
  • IsBadReadPtr (Address: 0x103af044)
  • LeaveCriticalSection (Address: 0x103af128)
  • LoadLibraryA (Address: 0x103af080)
  • MapViewOfFile (Address: 0x103af100)
  • OpenMutexA (Address: 0x103af0a8)
  • ReadFile (Address: 0x103af0b0)
  • ReadProcessMemory (Address: 0x103af0d0)
  • ReleaseMutex (Address: 0x103af09c)
  • ResumeThread (Address: 0x103af0f0)
  • SetEnvironmentVariableA (Address: 0x103af064)
  • SetLastError (Address: 0x103af084)
  • SetThreadContext (Address: 0x103af0dc)
  • SetThreadPriority (Address: 0x103af088)
  • Sleep (Address: 0x103af120)
  • SuspendThread (Address: 0x103af0e8)
  • UnmapViewOfFile (Address: 0x103af0d4)
  • VirtualAlloc (Address: 0x103af074)
  • VirtualProtect (Address: 0x103af070)
  • VirtualProtectEx (Address: 0x103af110)
  • VirtualQueryEx (Address: 0x103af0c8)
  • WaitForDebugEvent (Address: 0x103af0e4)
  • WaitForSingleObject (Address: 0x103af0a0)
  • WideCharToMultiByte (Address: 0x103af040)
  • WriteProcessMemory (Address: 0x103af114)
MSIMG32.dll
  • TransparentBlt (Address: 0x1052dddc)
MSVCRT.dll
  • _adjust_fdiv (Address: 0x103af1c8)
  • _except_handler3 (Address: 0x103af16c)
  • _initterm (Address: 0x103af1c0)
  • _stricmp (Address: 0x103af1cc)
  • _strnicmp (Address: 0x103af1d4)
  • _wcsicmp (Address: 0x103af1d0)
  • ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z (Address: 0x103af164)
  • ??2@YAPAXI@Z (Address: 0x103af1b0)
  • ??3@YAXPAX@Z (Address: 0x103af1b4)
  • atoi (Address: 0x103af170)
  • calloc (Address: 0x103af1b8)
  • exit (Address: 0x103af168)
  • free (Address: 0x103af1bc)
  • localtime (Address: 0x103af150)
  • malloc (Address: 0x103af1c4)
  • memcmp (Address: 0x103af1a4)
  • memcpy (Address: 0x103af1ac)
  • memmove (Address: 0x103af1a8)
  • memset (Address: 0x103af1a0)
  • sprintf (Address: 0x103af174)
  • strcat (Address: 0x103af160)
  • strchr (Address: 0x103af19c)
  • strcpy (Address: 0x103af198)
  • strftime (Address: 0x103af154)
  • strlen (Address: 0x103af184)
  • strncpy (Address: 0x103af180)
  • strrchr (Address: 0x103af194)
  • time (Address: 0x103af15c)
  • vsprintf (Address: 0x103af158)
  • wcschr (Address: 0x103af190)
  • wcscpy (Address: 0x103af18c)
  • wcslen (Address: 0x103af17c)
  • wcsncpy (Address: 0x103af178)
  • wcsrchr (Address: 0x103af188)
ole32.dll
  • RegisterDragDrop (Address: 0x1052de2c)
OLEACC.dll
  • AccessibleObjectFromWindow (Address: 0x1052ddf4)
OLEAUT32.dll
  • VariantChangeType (Address: 0x1052de34)
SHELL32.dll
  • SHGetDesktopFolder (Address: 0x1052de24)
SHLWAPI.dll
  • StrFormatKBSizeA (Address: 0x1052dde4)
USER32.dll
  • BeginPaint (Address: 0x103af1f4)
  • CreateDialogIndirectParamA (Address: 0x103af214)
  • CreateWindowExA (Address: 0x103af258)
  • CreateWindowExW (Address: 0x103af250)
  • DefWindowProcA (Address: 0x103af244)
  • DestroyWindow (Address: 0x103af230)
  • DispatchMessageA (Address: 0x103af26c)
  • EndPaint (Address: 0x103af1f8)
  • EnumThreadWindows (Address: 0x103af1e8)
  • EnumWindows (Address: 0x103af270)
  • FindWindowA (Address: 0x103af228)
  • FreeDDElParam (Address: 0x103af240)
  • GetAsyncKeyState (Address: 0x103af200)
  • GetDesktopWindow (Address: 0x103af1dc)
  • GetDlgItem (Address: 0x103af210)
  • GetMessageA (Address: 0x103af1f0)
  • GetPropA (Address: 0x103af1ec)
  • GetSystemMetrics (Address: 0x103af204)
  • GetWindowThreadProcessId (Address: 0x103af25c)
  • InSendMessage (Address: 0x103af238)
  • IsWindow (Address: 0x103af284)
  • IsWindowUnicode (Address: 0x103af274)
  • KillTimer (Address: 0x103af1fc)
  • LoadCursorA (Address: 0x103af248)
  • LoadStringA (Address: 0x103af220)
  • LoadStringW (Address: 0x103af224)
  • MessageBoxA (Address: 0x103af234)
  • MoveWindow (Address: 0x103af1e0)
  • PackDDElParam (Address: 0x103af278)
  • PeekMessageA (Address: 0x103af264)
  • PostMessageA (Address: 0x103af280)
  • PostMessageW (Address: 0x103af27c)
  • RegisterClassA (Address: 0x103af254)
  • RegisterClassW (Address: 0x103af24c)
  • SendMessageA (Address: 0x103af260)
  • SendMessageW (Address: 0x103af288)
  • SetPropA (Address: 0x103af1e4)
  • SetTimer (Address: 0x103af208)
  • SetWindowTextA (Address: 0x103af20c)
  • ShowWindow (Address: 0x103af218)
  • TranslateMessage (Address: 0x103af268)
  • UnpackDDElParam (Address: 0x103af23c)
  • UpdateWindow (Address: 0x103af21c)
  • WaitForInputIdle (Address: 0x103af22c)
UxTheme.dll
  • GetThemePartSize (Address: 0x1052ddec)
WINMM.dll
  • timeGetTime (Address: 0x1052de0c)
WINSPOOL.DRV
  • OpenPrinterA (Address: 0x1052de14)