AddWords
InitIndex
SaveIndexs
SetCallWnd
SetFilteredCharset
Static task
static1
Behavioral task
behavioral1
Sample
1aac058bef453403124583ce9765715c5c83bab93ebc1e4481a57a5148eacb16.dll
Resource
win7-20220901-en
Target
1aac058bef453403124583ce9765715c5c83bab93ebc1e4481a57a5148eacb16
Size
108KB
MD5
42cc89c6b504bbcd13077822aec000c0
SHA1
0385ac0a9cf0b5ff27930d8dbc8ac7da304a9dc5
SHA256
1aac058bef453403124583ce9765715c5c83bab93ebc1e4481a57a5148eacb16
SHA512
3fe826c346688fde250c0176acbfd0a2811d50dde9b1261f2715ef8113d15b47a527d379d6963e7496c1423c5ed43c1931c2311e06f17fb6b89d47ae4b28702b
SSDEEP
1536:pYbFLxw4IDT1otFUAvUDou5j7bk6qWNAqHnABYWZIwgl9F2gj6i2GbWRJ9qzn4:ylI1gxUDoupXqYnxWZIwXg+JGbuJIj
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentProcess
RtlUnwind
HeapFree
HeapReAlloc
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
IsBadWritePtr
CloseHandle
WriteFile
SetFilePointer
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
TerminateProcess
lstrcmpA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
CreateFileA
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
ReadFile
GetStringTypeA
GetStringTypeW
AddWords
InitIndex
SaveIndexs
SetCallWnd
SetFilteredCharset
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE