DoMsCtfMonitor
SHGetFolderPathW
TMethodImplementationIntercept
__dbk_fcall_wrapper
_ckhhl
_cnrpe
_eszxw
_idnuc
_msjhn
dbkFCallWrapperAddr
Static task
static1
Behavioral task
behavioral1
Sample
8be668d0275f9b6d05961b9f078f90baa794b6eba480e257c87b8fb4229113b6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8be668d0275f9b6d05961b9f078f90baa794b6eba480e257c87b8fb4229113b6.dll
Resource
win10v2004-20221111-en
Target
8be668d0275f9b6d05961b9f078f90baa794b6eba480e257c87b8fb4229113b6
Size
742KB
MD5
855484463832a4c0cb5ced0e6eeaf5fd
SHA1
18319f27639e15c83978b3ec9f4017835f94507f
SHA256
8be668d0275f9b6d05961b9f078f90baa794b6eba480e257c87b8fb4229113b6
SHA512
d444e08364b5631522224914f4377ad84ae718fba234af8fa289b0b723a5442148ac83b8d58666aa0a9e2a5d58df6f9da95da80aa3e02c745ff39b09065524a0
SSDEEP
6144:7mwkD9z+6O2eQKyN7069srZ5PIhdAiL9mFV0ocvKD4NStfluoslGgoWaD4nt:7bMu2J70jPI1vKD4NSNUrGTW
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CharNextW
LoadStringW
TranslateMessage
PeekMessageW
MsgWaitForMultipleObjects
MessageBoxW
LoadStringW
GetSystemMetrics
GetMessageW
DispatchMessageW
CharUpperW
CharLowerBuffW
Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
FreeLibrary
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualProtect
VirtualFree
VirtualAllocEx
VerSetConditionMask
VerifyVersionInfoW
SwitchToThread
SuspendThread
Sleep
SetThreadPriority
SetFilePointer
SetEvent
SetEndOfFile
ResumeThread
ResetEvent
ReadFile
OpenProcess
LocalFree
LoadLibraryW
IsValidLocale
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GetVersionExW
GetTickCount
GetThreadPriority
GetThreadLocale
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileAttributesW
GetExitCodeThread
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCPInfoExW
GetCPInfo
GetACP
FreeLibrary
FormatMessageW
FindFirstFileW
FindClose
EnumCalendarInfoW
CreateProcessW
CreateFileW
CreateEventW
CompareStringW
CloseHandle
Sleep
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
NetApiBufferFree
NetWkstaGetInfo
SHGetFolderPathW
DoMsCtfMonitor
SHGetFolderPathW
TMethodImplementationIntercept
__dbk_fcall_wrapper
_ckhhl
_cnrpe
_eszxw
_idnuc
_msjhn
dbkFCallWrapperAddr
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ