ClassexInfoA
CreateSysWindowA
sub_100C2978
sub_100C297A
sub_100C297C
sub_100C2980
sub_100C2984
sub_100C2988
sub_100C298C
sub_100C2990
sub_100C2994
sub_100C2998
Static task
static1
Behavioral task
behavioral1
Sample
89815d8e45f4c23d53ddd2bbcb8fd0f387548b527929b24cecd60cf2b3965fbc.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89815d8e45f4c23d53ddd2bbcb8fd0f387548b527929b24cecd60cf2b3965fbc.dll
Resource
win10v2004-20220812-en
Target
89815d8e45f4c23d53ddd2bbcb8fd0f387548b527929b24cecd60cf2b3965fbc
Size
42KB
MD5
0bf4331bbee11b7dec2b445fdfe44e16
SHA1
490fb6cd629bf7c4ca235391e63fda660113b33a
SHA256
89815d8e45f4c23d53ddd2bbcb8fd0f387548b527929b24cecd60cf2b3965fbc
SHA512
f2436da27156f237d023912552a1ecb5f423c21b9b7424fe4efe894b194e88214f90eb47977a082844be6ab46cb71c80be2ec30d9c4d1ade02238e3f2771e8f7
SSDEEP
768:lWZoHZQsBT+NsDNRWx4yZvo9opldjcHso0BE9Tfbqh:lsWQsBT+2pqfoOplNcHso6h
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetTickCount
GetCurrentThreadId
VirtualAlloc
VirtualFree
MultiByteToWideChar
TlsAlloc
GetProcAddress
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
GetProcessHeap
GetVersionExA
GetStringTypeW
GetStringTypeA
TerminateProcess
GetModuleHandleA
GetCommandLineA
GetVersion
ExitProcess
TlsSetValue
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
LoadLibraryA
LCMapStringA
LCMapStringW
RtlUnwind
GetSystemMetrics
RegDeleteValueA
ClassexInfoA
CreateSysWindowA
sub_100C2978
sub_100C297A
sub_100C297C
sub_100C2980
sub_100C2984
sub_100C2988
sub_100C298C
sub_100C2990
sub_100C2994
sub_100C2998
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ