GetAttrString
GetLocals
Number_Remainder
vGetToken
Static task
static1
Behavioral task
behavioral1
Sample
17a4f2e11bcda05211a0c04d0f9422a81129ed9bf6948dceea2358a58d01ca33.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17a4f2e11bcda05211a0c04d0f9422a81129ed9bf6948dceea2358a58d01ca33.dll
Resource
win10v2004-20220812-en
Target
17a4f2e11bcda05211a0c04d0f9422a81129ed9bf6948dceea2358a58d01ca33
Size
536KB
MD5
930ce8aa32a1d44730e646d4dccb6da5
SHA1
7054b4c88695844aaebe0157273460b49478a3dc
SHA256
17a4f2e11bcda05211a0c04d0f9422a81129ed9bf6948dceea2358a58d01ca33
SHA512
328897bd8efc6cc103712f30ac47560c9cacd08fa99daa3ac080932bd51b30b888a3e51599dbfec9eda0168b9c9fad285a6f8a98ab71475050a93e658da15638
SSDEEP
12288:XQ5r4ZFXVLzRrIRfquTWa5TPdZJslI7Xtqe:XQ5EZFFdEfB3LJslI7Xtqe
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteClassStm
OleSaveToStream
CreateOleAdviseHolder
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
GetVersionExA
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
GetFileType
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadResource
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
RtlUnwind
SetHandleCount
SetLastError
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualProtect
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
lstrcmpiA
lstrlenA
lstrlenW
GetEnvironmentStringsA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FlushInstructionCache
FindResourceA
ExitProcess
EnterCriticalSection
DisableThreadLibraryCalls
DeleteCriticalSection
InterlockedCompareExchange
VirtualQuery
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
SetWindowRgn
ShowWindow
UnionRect
UnregisterClassA
SetWindowPos
SetWindowLongA
SetFocus
ReleaseDC
RegisterClassExA
PtInRect
OffsetRect
LoadCursorA
IsWindow
IsChild
InvalidateRect
IntersectRect
GetWindowLongA
GetParent
GetKeyState
GetFocus
GetDC
GetClientRect
GetClassInfoExA
EqualRect
EndPaint
DestroyWindow
DefWindowProcA
CreateWindowExA
CharNextA
CallWindowProcA
BeginPaint
SetWindowOrgEx
SetWindowExtEx
StretchBlt
SaveDC
RestoreDC
TextOutA
GetDeviceCaps
DeleteMetaFile
DeleteDC
CreateRectRgnIndirect
CreateMetaFileA
CreateCompatibleDC
SetTextAlign
CloseMetaFile
Rectangle
LoadTypeLi
LoadRegTypeLi
RegisterTypeLi
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysAllocString
SysAllocStringByteLen
SysAllocStringLen
SysFreeString
SysStringByteLen
SysStringLen
VariantChangeType
VariantClear
VariantInit
OleCreatePropertyFrame
GetAttrString
GetLocals
Number_Remainder
vGetToken
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ