AsString
GetIter
InteractiveLoop
Long_AsLong
_InterruptOccurred
get_bit_depth
vGetFileA
Static task
static1
Behavioral task
behavioral1
Sample
9dee2609b4843dd46bcbc706ca5402ebdd255ae11a24796b72230581e93dff12.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9dee2609b4843dd46bcbc706ca5402ebdd255ae11a24796b72230581e93dff12.dll
Resource
win10v2004-20220812-en
Target
9dee2609b4843dd46bcbc706ca5402ebdd255ae11a24796b72230581e93dff12
Size
509KB
MD5
0cd4d8db0fc3732cce1154f9f246403d
SHA1
2664d868480a31273fc16dc12c7e774f32721981
SHA256
9dee2609b4843dd46bcbc706ca5402ebdd255ae11a24796b72230581e93dff12
SHA512
519e483b9a8a6bcb6cb0bbab961f2db9015903dc67de35c4f1f333c079c694c1a91849141f74fac64b0dc6d414aa00aac7206ac3a4401cb3b0e625209c77cc89
SSDEEP
12288:trt48kYQpxrjz7dWsQkgn0JSbo/NYZffVx:fkYQpxPNWpnySyNaf/
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DebugBreak
DeleteCriticalSection
DeleteFiber
DeviceIoControl
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindVolumeClose
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
FreeUserPhysicalPages
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleDisplayMode
GetConsoleScreenBufferInfo
GetCurrentConsoleFont
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetEnvironmentStringsA
GetFileAttributesA
GetFileAttributesW
GetFileSize
GetFileType
GetFullPathNameA
GetHandleInformation
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcessHeap
GetProcessIoCounters
GetProcessPriorityBoost
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeExA
GetStringTypeW
GetSystemDefaultLangID
GetSystemInfo
GetSystemTimeAsFileTime
CreateFileA
GetTickCount
GetUserDefaultLCID
GetUserDefaultUILanguage
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsValidLocale
LCMapStringA
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LocalSize
Module32Next
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
ResetEvent
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetFilePointerEx
SetFileTime
SetHandleCount
SetLastError
SetThreadLocale
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrlenA
CreateEventA
CompareStringA
CloseHandle
GetThreadLocale
CancelDeviceWakeupRequest
SysAllocStringByteLen
SysAllocStringLen
SysFreeString
SysReAllocStringLen
VarCmp
VarFix
VarUI2FromDate
VariantChangeType
VariantClear
VariantCopy
VariantCopyInd
VariantInit
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayGetElement
SetupDiDeleteDeviceInterfaceData
SetupCloseInfFile
CM_Uninstall_DevNode
CM_Get_Sibling
SetupUninstallNewlyCopiedInfs
SetupOpenLog
AreAllAccessesGranted
RegOpenKeyExA
RegQueryValueExA
EncryptionDisable
socket
ntohs
htonl
WSAAsyncGetHostByAddr
CharNextA
wsprintfA
LoadStringA
EnumThreadWindows
CreateIconIndirect
ActivateKeyboardLayout
AsString
GetIter
InteractiveLoop
Long_AsLong
_InterruptOccurred
get_bit_depth
vGetFileA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ