FromString
ImportFrozenModule
List_SetSlice
Long_AsLong
String_Encode
get_color_type
get_error_ptr
get_pixel_aspect_ratio
write_info
Static task
static1
Behavioral task
behavioral1
Sample
b20abd87057eba211450e5de73b1c6041f1b1e665a315d7a7a1f279c35ef6505.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b20abd87057eba211450e5de73b1c6041f1b1e665a315d7a7a1f279c35ef6505.dll
Resource
win10v2004-20220812-en
Target
b20abd87057eba211450e5de73b1c6041f1b1e665a315d7a7a1f279c35ef6505
Size
642KB
MD5
217ade1c6c4198d6ba4e69426bfe1def
SHA1
38d4a32df28b0bced3c7c7eb47b6588f66028968
SHA256
b20abd87057eba211450e5de73b1c6041f1b1e665a315d7a7a1f279c35ef6505
SHA512
3131fbb3d2b9aaf4291de98f7791a0e65037e02e09a73dcef9ae8613e81b72454d7e1f198a35c2aeffb4aa837c14ef9154e029af29cfc9e5ce608e2022e0f4c6
SSDEEP
12288:r/aFOcJ5fzeM97vIWpnSBdE8kZpk5CmVV:zaFOcjzl7vIuSBSOC6V
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindFirstFileA
FreeEnvironmentStringsA
FreeLibrary
FreeResource
FreeUserPhysicalPages
GetACP
GetCPInfo
GetCommandLineA
GetConsoleDisplayMode
GetCurrentConsoleFont
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetHandleInformation
GetLastError
GetLocaleInfoA
GetLogicalDrives
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessIoCounters
GetProcessPriorityBoost
GetStdHandle
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemInfo
GetSystemTimeAsFileTime
GetTapePosition
GetTapeStatus
GetThreadLocale
GetThreadPriority
GetTickCount
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalDeleteAtom
GlobalFix
GlobalFree
GlobalHandle
GlobalLock
CreateEventA
GlobalReAlloc
GlobalUnlock
Heap32ListNext
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadModule
LocalAlloc
LocalFileTimeToFileTime
LocalReAlloc
Module32FirstW
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
ResumeThread
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetFilePointerEx
SetHandleCount
SetLastError
SetProcessAffinityMask
SetThreadExecutionState
SetThreadLocale
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteFile
_lopen
lstrcpynA
CreateConsoleScreenBuffer
ConvertDefaultLocale
CloseHandle
GlobalMemoryStatus
AllocConsole
RegCloseKey
CreateTraceInstanceId
AreAllAccessesGranted
RegOpenKeyExA
GetKeyboardType
LoadStringA
keybd_event
EnumThreadWindows
wsprintfA
GetKeyboardLayout
VarR4FromI2
VariantInit
VariantCopyInd
VariantChangeType
VarI1FromDate
VarCyFromUI4
LPSAFEARRAY_Unmarshal
SafeArrayGetElement
SafeArrayGetLBound
SysFreeString
SysReAllocStringLen
VarBoolFromR4
VarCmp
CM_Get_Sibling
SetupUninstallNewlyCopiedInfs
SetupOpenLog
SetupDiInstallDevice
SetupDiDeleteDeviceInterfaceData
SetupCloseInfFile
htonl
ntohl
socket
WSACancelAsyncRequest
FromString
ImportFrozenModule
List_SetSlice
Long_AsLong
String_Encode
get_color_type
get_error_ptr
get_pixel_aspect_ratio
write_info
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ