ExecuteMethodA
GeneratePMesh
GetSubSchemaSubEntryPath
SHScale
SaveBitmapMemory
SetSearchPreference
SetStaticNetbiosNames
Vec3TransformArray
Static task
static1
Behavioral task
behavioral1
Sample
eab669b660d4c8168c5148f6d083173fa04a08464f03136dcdd7a7f325ef5dd9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eab669b660d4c8168c5148f6d083173fa04a08464f03136dcdd7a7f325ef5dd9.dll
Resource
win10v2004-20220812-en
Target
eab669b660d4c8168c5148f6d083173fa04a08464f03136dcdd7a7f325ef5dd9
Size
364KB
MD5
26574ef646a43140463f0b57c008239e
SHA1
a1ca4b74695a942eb66ef032b9fd62931be8c1ff
SHA256
eab669b660d4c8168c5148f6d083173fa04a08464f03136dcdd7a7f325ef5dd9
SHA512
109f34b827b26e23e14bf106d30e0760fb71923e4d9c094812af389ad4d9d03f6bd58f84d6c979cdee2114ab2de117a512faf83f2905c08e2cda4da8c773d547
SSDEEP
6144:I3X1twTHxJO1FB3CEdLA3iZ9N5eZtlGNTkWoLyqSDSpBuKvWlC0yofWdGF:TcN5Le0SVy2Zv70ZfWdG
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
StringFromCLSID
CoTaskMemFree
SetSecurityDescriptorGroup
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
WideCharToMultiByte
lstrlenW
GetEnvironmentVariableA
Beep
ChangeTimerQueueTimer
CloseHandle
CreateFileA
CreateProcessA
DeleteCriticalSection
DisconnectNamedPipe
ExitProcess
FreeLibrary
GetACP
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocaleInfoA
GetLongPathNameA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessPriorityBoost
GetStartupInfoA
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetVersionExA
InitializeCriticalSection
IsDBCSLeadByteEx
LoadLibraryA
QueryPerformanceCounter
VirtualAlloc
ExecuteMethodA
GeneratePMesh
GetSubSchemaSubEntryPath
SHScale
SaveBitmapMemory
SetSearchPreference
SetStaticNetbiosNames
Vec3TransformArray
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ