RMACreateInstance
RMAShutdown
SetDLLAccessPath
Static task
static1
Behavioral task
behavioral1
Sample
7da293286d3ee048aaf224154773851b17eec22846b139b83c81ee689edb84e4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7da293286d3ee048aaf224154773851b17eec22846b139b83c81ee689edb84e4.dll
Resource
win10v2004-20220901-en
Target
7da293286d3ee048aaf224154773851b17eec22846b139b83c81ee689edb84e4
Size
212KB
MD5
2333d2dee02c38f451f0b4fe2b0e5f70
SHA1
7068a5d0548cc1410cadae8207b53e91a515eeff
SHA256
7da293286d3ee048aaf224154773851b17eec22846b139b83c81ee689edb84e4
SHA512
ba65cf5466646a178505fe9134201cb09782e79bcfe983d2281c4c6952aa45013b349f9dd67957d1288dc47353d9a7dc2d776a0c2330f49e4f316de7da98b73c
SSDEEP
3072:A9Zx8ubF5fZOvJxW7MHpDLqwdQgCvlhS+0uz9+4NTZDWVrAi8WNMXr0ezn6j:A9HbF5fgvjXBqYoS+/kAi8W70
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
sprintf
strncmp
_mbctype
strncpy
_vsnprintf
realloc
malloc
strtod
printf
__dllonexit
_onexit
_initterm
_adjust_fdiv
strtok
free
??2@YAPAXI@Z
tolower
strtol
toupper
sscanf
atol
memmove
atoi
isspace
isdigit
strchr
_putenv
??3@YAXPAX@Z
_purecall
rand
_getmbcp
_ftol
_stricmp
strstr
GetVersionExA
LoadLibraryA
SetErrorMode
DisableThreadLibraryCalls
GetCurrentDirectoryA
SetCurrentDirectoryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
SendMessageA
GetSystemMetrics
CharPrevA
SystemParametersInfoA
GetActiveWindow
GetWindowRect
ClientToScreen
CharNextA
GetSysColor
CreateDCA
CreateCompatibleDC
GetStockObject
SelectObject
GetTextFaceA
DeleteDC
GetSaveFileNameA
GetOpenFileNameA
SHGetPathFromIDListA
SHBrowseForFolderA
RMACreateInstance
RMAShutdown
SetDLLAccessPath
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE