AddPicture2
EnumTvValueNext
GetDevice
GetLastError
Launch
Malloc
MemGetInfo
Memcpy2DToArray
ReadDevParamFromRAW
ReflectParamValues
Static task
static1
Behavioral task
behavioral1
Sample
3e0b047abb63d6d84c7791edbeb3ec45f8dde1f5fe0e5e5d5076e596ae08e8a7.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3e0b047abb63d6d84c7791edbeb3ec45f8dde1f5fe0e5e5d5076e596ae08e8a7.dll
Resource
win10v2004-20220812-en
Target
3e0b047abb63d6d84c7791edbeb3ec45f8dde1f5fe0e5e5d5076e596ae08e8a7
Size
227KB
MD5
0790ca87cb83ce4b75cd6e2e4c1b0e4f
SHA1
cec4664686cd9839ab7af5aea54cab030014b941
SHA256
3e0b047abb63d6d84c7791edbeb3ec45f8dde1f5fe0e5e5d5076e596ae08e8a7
SHA512
7a03462f03f2d318229db1a001b3bc64182581d54bbb4bbdb01216135f4507b360c5cc0d5ca018f9a62b3fe3111e53212e9102a5265f575e015d4e5f18d235c6
SSDEEP
6144:AbOfrVif/gAti4NTz3Y7FSgInaReXPBdJHGW6wH/3a:pf8HgAJNY7wgInhpfGW6O
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VariantClear
SysFreeString
VariantInit
SysAllocString
CoCreateInstance
CLSIDFromString
CoTaskMemFree
iswspace
iswxdigit
malloc
memcpy
memmove
memset
strrchr
towupper
wcschr
wcsrchr
wcsstr
wcstod
wcstol
wcstoul
wctomb
isleadbyte
free
_wtol
_write
_wcsupr
_wcsnicmp
_wcsicmp
_vsnwprintf
_unlock
_ultow
_stricmp
_snprintf
_purecall
_onexit
_lseeki64
_lock
_itoa
_isatty
_iob
_initterm
_fileno
_errno
_callnewh
_amsg_exit
__pioinfo
__dllonexit
__badioinfo
_XcptFilter
_CxxThrowException
CreateSemaphoreA
CreateFileW
DebugBreak
CreateSemaphoreW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualProtect
VirtualAlloc
VerifyVersionInfoW
VerSetConditionMask
UnhandledExceptionFilter
TerminateProcess
Sleep
SetUnhandledExceptionFilter
SetStdHandle
SetLastError
SetConsoleTextAttribute
RtlUnwind
ReleaseSemaphore
ReadFile
QueryPerformanceCounter
OutputDebugStringA
MultiByteToWideChar
LocalReAlloc
LocalFree
LocalAlloc
LoadLibraryA
LeaveCriticalSection
InterlockedIncrement
InterlockedExchangeAdd
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
HeapWalk
HeapUnlock
HeapReAlloc
HeapLock
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalFree
GlobalAlloc
GetVersion
GetTickCount
GetSystemTimeAsFileTime
GetSystemInfo
GetStdHandle
GetStartupInfoA
GetProcessHeap
GetProcAddress
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetLocalTime
GetLastError
GetFileSize
GetEnvironmentVariableW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCommandLineA
GetACP
FormatMessageW
FormatMessageA
FlushFileBuffers
FindNextFileW
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
ExitProcess
EnterCriticalSection
DisableThreadLibraryCalls
DeleteTimerQueueTimer
DeleteCriticalSection
CloseHandle
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
DeregisterEventSource
AddPicture2
EnumTvValueNext
GetDevice
GetLastError
Launch
Malloc
MemGetInfo
Memcpy2DToArray
ReadDevParamFromRAW
ReflectParamValues
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ