CreateInterface
_ftol3
Static task
static1
Behavioral task
behavioral1
Sample
5a424c2f9941abbed486282ea40007b42e8eca37d640db2283ae516bcfe44a52.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5a424c2f9941abbed486282ea40007b42e8eca37d640db2283ae516bcfe44a52.dll
Resource
win10v2004-20220901-en
Target
5a424c2f9941abbed486282ea40007b42e8eca37d640db2283ae516bcfe44a52
Size
420KB
MD5
3f36513deedeeacb5d96012d630c2b89
SHA1
137769d95f802becd274396deb95bb505086cda7
SHA256
5a424c2f9941abbed486282ea40007b42e8eca37d640db2283ae516bcfe44a52
SHA512
e2a118e824b50361edc0641210c362f4656fc52f1178cae60d69756cd8bdb633fccade53eb53c79fbc9a3d5ee0203cb0a2fb66fafdc8735b6ee9c42488640d4b
SSDEEP
6144:Eyt0GhYLj0PT3coMEHAOwvZ9xhzLw1I/u1tHxgIh5nQCrOOOkoi:E8Y3i3cxE69x5U1Im3pHQCaOOfi
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
VirtualQuery
HeapAlloc
GetProcessHeap
CloseHandle
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetCurrentThreadId
GetCommandLineA
GetVersionExA
ExitProcess
RtlUnwind
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
WriteFile
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
SetFilePointer
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
GetLocaleInfoA
VirtualProtect
VirtualAlloc
GetSystemInfo
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadCodePtr
RaiseException
Warning
g_pMemAlloc
GetCPUInformation
CreateInterface
_ftol3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE