LoadVolumeFromVolume
MatrixDecompose
SHDot
SHEvalSphericalLight
SchemaIsClassAContainer
Static task
static1
Behavioral task
behavioral1
Sample
be5713adf3c56f65f37371f12ef4a925886b9c1c95c7ac9d000c07ecb152a129.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be5713adf3c56f65f37371f12ef4a925886b9c1c95c7ac9d000c07ecb152a129.dll
Resource
win10v2004-20220812-en
Target
be5713adf3c56f65f37371f12ef4a925886b9c1c95c7ac9d000c07ecb152a129
Size
355KB
MD5
077db5c2476547642723cfe9dcd90908
SHA1
9bf6dbe39a53354efb07cd859810e9559fcb202b
SHA256
be5713adf3c56f65f37371f12ef4a925886b9c1c95c7ac9d000c07ecb152a129
SHA512
cd9d2fdcde2caed37896cc53efaabf5f5e0b182a476021760fd1ae95a346a028b9bf2458e90b622f68c84ce85d25523225c56696a091f2ed8a077b6f6a248345
SSDEEP
6144:00Mlp+j5xlrX8tgDqbBM8r++m/Sd6TK0TyTK0j6m+M/0qiVT4ClzRe0YsmU:0mj5xxSeCBM4gSQOkIMq49as7
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StringFromCLSID
CoTaskMemFree
CreateFileA
CreateProcessA
DeleteCriticalSection
ExitProcess
FreeLibrary
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessPriorityBoost
CloseHandle
GetStartupInfoA
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetVersionExA
InitializeCriticalSection
LoadLibraryA
LocalUnlock
QueryPerformanceCounter
SetCommConfig
SetErrorMode
VirtualAlloc
VirtualUnlock
WaitForSingleObject
WideCharToMultiByte
lstrlenW
ChangeTimerQueueTimer
GetShortPathNameA
RegQueryValueExA
RegEnumKeyA
LsaQueryInfoTrustedDomain
RegCloseKey
LoadVolumeFromVolume
MatrixDecompose
SHDot
SHEvalSphericalLight
SchemaIsClassAContainer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ