InPlaceSubtract
UserWarning
_strtol
convert_to_rfc1123
read_image
Static task
static1
Behavioral task
behavioral1
Sample
1b1e5f2d17d7a69dddd8fcb2a824f47d17363f13c8b5adb2b4c30037c5b176c5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1b1e5f2d17d7a69dddd8fcb2a824f47d17363f13c8b5adb2b4c30037c5b176c5.dll
Resource
win10v2004-20220812-en
Target
1b1e5f2d17d7a69dddd8fcb2a824f47d17363f13c8b5adb2b4c30037c5b176c5
Size
332KB
MD5
14ae3508c0ccd402244ed66b254977fa
SHA1
9061c91bcd50d0e9d985b10e267346f4dabb62b6
SHA256
1b1e5f2d17d7a69dddd8fcb2a824f47d17363f13c8b5adb2b4c30037c5b176c5
SHA512
190c2b288cc313f78cd8e1dc8d4e970c736cebf027e26a3cd862544b9e238a16b6b11d8e9af655a1b6f66d1b68a813070054f1995d25bd96dd4d56a1d1d53b74
SSDEEP
6144:6wHKUrgTrZZJo7vQpkppvHDa1t6O2o+v5Mo3jFVcM+wKfu:6wHK0+HwYCpAaiop+
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
LoadTypeLi
RegisterTypeLi
SysAllocString
SysFreeString
SysStringLen
UnRegisterTypeLi
VarUI4FromStr
VariantClear
UnhookWindowsHookEx
ShowWindow
SetWindowsHookExA
SetFocus
RegisterClipboardFormatA
IsZoomed
IsWindowVisible
IsIconic
GetWindowRect
GetWindowLongA
GetSystemMetrics
GetParent
GetForegroundWindow
EnumDisplaySettingsA
DestroyWindow
CreateDialogParamA
CharNextW
CharNextA
CallNextHookEx
MoveWindow
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
CreateDataAdviseHolder
StringFromGUID2
lstrlenW
lstrlenA
lstrcmpiA
WriteFile
WideCharToMultiByte
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
TerminateProcess
Sleep
SizeofResource
SetUnhandledExceptionFilter
SetLastError
SetHandleCount
RtlUnwind
RaiseException
QueryPerformanceCounter
MultiByteToWideChar
LoadResource
LeaveCriticalSection
LCMapStringW
LCMapStringA
IsValidCodePage
IsDebuggerPresent
IsDBCSLeadByte
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
HeapSize
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindResourceA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentStringsW
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
InPlaceSubtract
UserWarning
_strtol
convert_to_rfc1123
read_image
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ