AMXX_Attach
AMXX_Detach
AMXX_PluginsLoaded
AMXX_PluginsUnloaded
AMXX_PluginsUnloading
AMXX_Query
Static task
static1
Behavioral task
behavioral1
Sample
c5d92e69ce87e9114deb6c723133869c8ba17a0288ecdf3f7354c48ccca3fd47.dll
Resource
win7-20220812-en
Target
c5d92e69ce87e9114deb6c723133869c8ba17a0288ecdf3f7354c48ccca3fd47
Size
124KB
MD5
4d31fb38a5d443fb729787120b380a30
SHA1
df9277113834c79d7c4c481cdf68ac42e06ef4e0
SHA256
c5d92e69ce87e9114deb6c723133869c8ba17a0288ecdf3f7354c48ccca3fd47
SHA512
efdf4a6b27aa2a638cd133d312dbbc023cc7ccd4522a17c44037164b52f61d0356da7f562c52e23757d8f20b28e200b0cea9b207de696fa03a53e011cf1db121
SSDEEP
1536:vwrtXLGRluJQ3TapI8E/vCQDQ79k2LNXm5Aj8NhTEUJm81WbGiXnXGojgWQkqf75:IQuO8E/vrD09k2LfYxEupiWojv5qqD0
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
WSAStartup
WideCharToMultiByte
CompareStringW
CompareStringA
GetTimeZoneInformation
GetCurrentDirectoryA
GetModuleFileNameA
GetModuleHandleA
ExitProcess
HeapAlloc
HeapFree
HeapReAlloc
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetLastError
ReadFile
GetProcAddress
TerminateProcess
GetCurrentProcess
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
CloseHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetEnvironmentStringsW
UnhandledExceptionFilter
DisableThreadLibraryCalls
WriteFile
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
SetStdHandle
FlushFileBuffers
CreateFileA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetACP
GetOEMCP
GetCPInfo
HeapSize
SetEndOfFile
GetLocaleInfoA
VirtualProtect
GetSystemInfo
LCMapStringA
LCMapStringW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetFileInformationByHandle
PeekNamedPipe
GetFullPathNameA
AMXX_Attach
AMXX_Detach
AMXX_PluginsLoaded
AMXX_PluginsUnloaded
AMXX_PluginsUnloading
AMXX_Query
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE