FromReadWriteMemory
GetItemString
InteractLoop
ParseFile
Proxy_New
State_New
get_gAMA_fixed
set_expand
Static task
static1
Behavioral task
behavioral1
Sample
480686110a1e25f7ae05923f13764ebea25e83dcdbaf4d5f6eb1f5d34b4a57c4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
480686110a1e25f7ae05923f13764ebea25e83dcdbaf4d5f6eb1f5d34b4a57c4.dll
Resource
win10v2004-20220812-en
Target
480686110a1e25f7ae05923f13764ebea25e83dcdbaf4d5f6eb1f5d34b4a57c4
Size
557KB
MD5
6971fab2ffe434c140d8696fd9b9d3fb
SHA1
c4b9a5e3c0338d9018fc1e61f58d721ccee7ed24
SHA256
480686110a1e25f7ae05923f13764ebea25e83dcdbaf4d5f6eb1f5d34b4a57c4
SHA512
57d5459ad2915a7fa22bcadbf656d2ece5aa1b9b2cb02f13a0cec57a4f9964916cc425024e06b86371ca9223a7fc8a4d1adfe2ee142a27bfac99906d9fa1e555
SSDEEP
12288:PouS/oqjwfFq4/mbUaafDpBQZ7663CaltfT/9K8z4MmBa:wuSQqjGFq4/mbUz3Q3Ca7fT88z4K
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteClassStm
OleSaveToStream
CreateOleAdviseHolder
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetVersionExA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
GetFileType
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadResource
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
RtlUnwind
SetHandleCount
SetLastError
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualProtect
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
lstrcmpiA
lstrlenA
lstrlenW
GetEnvironmentStringsA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FlushInstructionCache
FindResourceA
ExitProcess
EnterCriticalSection
DisableThreadLibraryCalls
DeleteCriticalSection
InterlockedCompareExchange
VirtualQuery
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
SetWindowRgn
ShowWindow
UnionRect
UnregisterClassA
SetWindowPos
SetWindowLongA
SetFocus
ReleaseDC
RegisterClassExA
PtInRect
OffsetRect
LoadCursorA
IsWindow
IsChild
InvalidateRect
IntersectRect
GetWindowLongA
GetParent
GetKeyState
GetFocus
GetDC
GetClientRect
GetClassInfoExA
EqualRect
EndPaint
DestroyWindow
DefWindowProcA
CreateWindowExA
CharNextA
CallWindowProcA
BeginPaint
SetWindowOrgEx
SetWindowExtEx
StretchBlt
SaveDC
RestoreDC
TextOutA
GetDeviceCaps
DeleteMetaFile
DeleteDC
CreateRectRgnIndirect
CreateMetaFileA
CreateCompatibleDC
SetTextAlign
CloseMetaFile
Rectangle
LoadTypeLi
LoadRegTypeLi
RegisterTypeLi
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysAllocString
SysAllocStringByteLen
SysAllocStringLen
SysFreeString
SysStringByteLen
SysStringLen
VariantChangeType
VariantClear
VariantInit
OleCreatePropertyFrame
FromReadWriteMemory
GetItemString
InteractLoop
ParseFile
Proxy_New
State_New
get_gAMA_fixed
set_expand
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ