DAE
GetDevSplineArrayEx
GetDevicePropertyCount
GetDiscErasingTime
GetDiscImageInfo
MutexOperation
Static task
static1
Behavioral task
behavioral1
Sample
00dae36c6cd4908fe0c295e7a00bcb3ca0a646cba8fb01fa24dccb3b288f7995.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00dae36c6cd4908fe0c295e7a00bcb3ca0a646cba8fb01fa24dccb3b288f7995.dll
Resource
win10v2004-20220812-en
Target
00dae36c6cd4908fe0c295e7a00bcb3ca0a646cba8fb01fa24dccb3b288f7995
Size
239KB
MD5
449691ef0531228737b1e1b3343d9215
SHA1
6abbf4f5e53d738fa860694723fcb640361ff55a
SHA256
00dae36c6cd4908fe0c295e7a00bcb3ca0a646cba8fb01fa24dccb3b288f7995
SHA512
c8113f44c0d7897389312020bc5dffc5144bde39060877136aec14a0f5f2af9555099724743b9e23b4740fa5b306c59b10c509e9e2178b5d9a963c722f6a6454
SSDEEP
6144:WYcNl4TzlZu/FQsiuKaVsje4kq9scnsG9o6RkBVQ6nfu62EAl6bySbjbc:kOM5iVvjeFNGu6RkVZfnrAlxA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
CoTaskMemFree
CoCreateInstance
CLSIDFromString
malloc
memcpy
memmove
memset
strrchr
towupper
wcschr
wcsrchr
wcsstr
wcstod
wcstol
wcstoul
wctomb
iswxdigit
iswspace
isleadbyte
free
_wtol
_write
_wcsupr
_wcsnicmp
_wcsicmp
_vsnwprintf
_unlock
_ultow
_stricmp
_snprintf
_purecall
_onexit
_lseeki64
_lock
_itoa
_isatty
_iob
_initterm
_fileno
_errno
_callnewh
_amsg_exit
__pioinfo
__dllonexit
__badioinfo
_XcptFilter
_CxxThrowException
VariantClear
SysFreeString
SysAllocString
VariantInit
DeregisterEventSource
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
VerifyVersionInfoW
VerSetConditionMask
UnhandledExceptionFilter
TerminateProcess
Sleep
SetUnhandledExceptionFilter
SetStdHandle
SetLastError
SetConsoleTextAttribute
RtlUnwind
ReleaseSemaphore
ReadFile
QueryPerformanceCounter
OutputDebugStringA
MultiByteToWideChar
LocalReAlloc
LocalFree
LocalAlloc
LoadLibraryA
LeaveCriticalSection
InterlockedIncrement
InterlockedExchangeAdd
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
HeapWalk
HeapUnlock
HeapReAlloc
HeapLock
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalFree
GlobalAlloc
VirtualAlloc
GetTickCount
GetSystemTimeAsFileTime
GetSystemInfo
GetStdHandle
GetStartupInfoA
GetProcessHeap
GetProcAddress
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLocalTime
GetLastError
GetFileSize
GetEnvironmentVariableW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCommandLineA
GetACP
FormatMessageW
FormatMessageA
FlushFileBuffers
FindNextFileW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
ExitProcess
EnterCriticalSection
DisableThreadLibraryCalls
DeleteTimerQueueTimer
DeleteCriticalSection
DebugBreak
CreateSemaphoreW
CreateSemaphoreA
CreateFileW
CloseHandle
WaitForSingleObject
WideCharToMultiByte
WriteFile
GetVersion
VirtualProtect
DAE
GetDevSplineArrayEx
GetDevicePropertyCount
GetDiscErasingTime
GetDiscImageInfo
MutexOperation
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ